WO2013074855A1 - Interface de plan de contrôle pour services logiques de boîtier intermédiaire - Google Patents
Interface de plan de contrôle pour services logiques de boîtier intermédiaire Download PDFInfo
- Publication number
- WO2013074855A1 WO2013074855A1 PCT/US2012/065383 US2012065383W WO2013074855A1 WO 2013074855 A1 WO2013074855 A1 WO 2013074855A1 US 2012065383 W US2012065383 W US 2012065383W WO 2013074855 A1 WO2013074855 A1 WO 2013074855A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- middlebox
- data
- network
- readable medium
- logical
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/177—Initialisation or configuration control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0889—Techniques to speed-up the configuration process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0894—Policy-based network configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/64—Routing or path finding of packets in data switching networks using an overlay routing layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/70—Virtual switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2517—Translation of Internet protocol [IP] addresses using port numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2521—Translation architectures other than single NAT servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/4557—Distribution of virtual machine instances; Migration and load balancing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/15—Interconnection of switching modules
Definitions
- Networks have traditionally been managed through low-level configuration of individual network components. Network configurations often depend on the underlying network: for example, blocking a user's access with an access control list (“ACL") entry requires knowing the user's current IP address. More complicated tasks require more extensive network knowledge: forcing guest users' port 80 traffic to traverse an HTTP proxy requires knowing the current network topology and the location of each guest. This process is of increased difficulty where the network switching elements are shared across multiple users.
- ACL access control list
- SDN Software-Defined Networking
- a network controller running on one or more servers in a network, controls, maintains, and implements control logic that governs the forwarding behavior of shared network switching elements on a per user basis. Making network management decisions often requires knowledge of the network state.
- the network controller creates and maintains a view of the network state and provides an application programming interface upon which management applications may access a view of the network state.
- Some embodiments provide a non-transitory machine readable medium of a first middlebox element of several middlebox elements to implement a middlebox instance in a distributed manner in several hosts.
- the non-transitory machine readable medium stores a set of instructions for receiving (1) configuration data for configuring the middlebox instance to implement a middlebox in a logical network and (2) a particular identifier associated with the middlebox in the logical network.
- the non-transitory machine readable medium stores a set of instructions for generating (1) a set of rules to process packets for the middlebox in the logical network and (2) an internal identifier associated with the set of rules.
- the non- transitory machine readable medium stores a set of instructions for associating the particular identifier with the internal identifier for later processing of packets having the particular identifier.
- Figure 1 conceptually illustrates an example deployment of a middlebox in a logical network according to some embodiments of the invention.
- Figure 2 conceptually illustrates a physical network architecture that implements the logical network illustrated in Figure 1 according to some embodiments of the invention.
- Figure 3 conceptually illustrates another physical network architecture that implements the logical network illustrated in Figure 1 according to some embodiments of the invention.
- Figure 4 conceptually illustrates a managed network architecture of some embodiments that is used to implement a logical network.
- FIG 5 conceptually illustrates an example flow of configuration data for the managed network architecture illustrated in Figure 4 according to some embodiments of the invention.
- Figure 6 illustrates example architecture of a network controller of some embodiments
- Figure 7 conceptually illustrates a software architecture of a middlebox of some embodiments.
- Figure 8 conceptually illustrates a technique for creating a middlebox instance according to some embodiments of the invention.
- Figure 9 conceptually illustrates another technique for creating a middlebox instance according to some embodiments of the invention.
- FIG. 10 conceptually illustrates an electronic device with which some embodiments of the invention are implemented.
- Some embodiments provide a non-transitory machine readable medium of a first middlebox element of several middlebox elements to implement a middlebox instance in a distributed manner in several hosts.
- the non-transitory machine readable medium stores a set of instructions for receiving (1) configuration data for configuring the middlebox instance to implement a middlebox in a logical network and (2) a particular identifier associated with the middlebox in the logical network.
- the non-transitory machine readable medium stores a set of instructions for generating (1) a set of rules to process packets for the middlebox in the logical network and (2) an internal identifier associated with the set of rules.
- the non- transitory machine readable medium stores a set of instructions for associating the particular identifier with the internal identifier for later processing of packets having the particular identifier.
- Section I conceptually describes details of several types of middlebox deployments in a logical network according to some embodiments of the invention.
- Section II conceptually describes details of the managed network architecture that is used to implement a logical network according to some embodiments of the invention.
- Section III follows this with a description of a configuration data flow for the managed network architecture of some embodiments.
- Section IV describes several logical processing examples according to some embodiments of the invention.
- Section V describes an electronic system that implements some embodiments of the invention.
- Figure 1 conceptually illustrates an example deployment of a middlebox 160 in a logical network 150 according to some embodiments of the invention. Specifically, Figure 1 illustrates the logical topology of the logical network 150 in which the middlebox 160 is deployed.
- a user specifies the logical network 150 by providing input (e.g., through a network controller) that describes a logical datapath set (LDPS), which is implemented by a set of network infrastructure switching elements (not shown in Figure 1).
- LDPS logical datapath set
- a logical data path set defines a loeical network element.
- a logical data path set in some embodiments, is a set of network data paths through the set of network infrastructure switching elements that implement the logical network element and the logical network element's defined functionalities.
- the logical network 150 in this example is a conceptual representation of the LDPS specified by the user.
- the logical network 150 includes a logical layer 3 (L3) router 155, the middlebox 160, logical layer 2 (L2) switches 165 and 170, and VMs 175-195.
- the L3 router 155 handles layer 3 routing of network data (e.g., packets) between the L2 switches 165 and 170 and the middlebox 160.
- the L2 switch 165 forwards network data between the L3 router 155 and the VMs 175 and 180 while the L2 switch 170 forwards network data between the L3 router 155 and the VMs 185- 195.
- the VMs 175-195 of some embodiments are host machines implemented as virtual machines running on separate and/or shared physical machines.
- the VMs 175-195 of some embodiments are each assigned a set of network layer host addresses (e.g., a MAC address for network layer 2, an IP address for network layer 3, etc.) and can send and receive network data to and from other network elements over the network.
- network layer host addresses e.g., a MAC address for network layer 2, an IP address for network layer 3, etc.
- the middlebox 160 is a networking device that performs one or more operations (e.g., transforming, inspecting, filtering, manipulating, etc.) on network data for purposes other than forwarding of the network data.
- middleboxes include firewalls, intrusion detection systems, network address translators (e.g., source network address translators (SNATs), destination network address translators (DNATs), etc.), wide area network (WAN) optimizers, etc.
- the middlebox 160 is a centralized middlebox that is implemented as a physical device, a set of physical devices (e.g., a cluster of physical devices), a virtual machine, a software application or module running on a computing device or a virtual machine, etc.
- the middlebox 160 of some embodiments is a distributed middlebox that is implemented as several physical devices, sets of physical devices (e.g., clusters of physical devices), virtual machines, software applications or modules running on computing devices or virtual machines, or any combination of the aforementioned implementations.
- a distributed middlebox shares some or state among the different devices implemented the distributed middlebox while, in other embodiments, the distributed middlebox does not need state sharing capabilities.
- the middlebox 160 is arranged as bounded or isolated by the L3 router 155 in the logical topology of the logical network 150. That is, network data must go through the L3 router 155 in order to reach the middlebox 160. As such, network data from within the logical network that is specified (1) to be sent over that WAN 130 and (2) to be processed by the middlebox 160 is sent to the middlebox 160 through the L3 router 155. After the middlebox 160 processes such network data, the data is sent back through the L3 router 155 for the L3 router 155 to route the processed network data to its specified destination (e.g., one of the VMs 175-195).
- the logical topology of the logical network 150 is one exemplary logical network topology into which a middlebox is incorporated. Different embodiment use different logical topologies into which a middlebox is incorporated.
- the middlebox 160 generates a copy of the processed network data and sends the copy of the processed network data back to the L3 router 155 for routing to the network data's destination.
- the L3 router 155 receives back from the middlebox 160 new network data (new packets) that is generated by the middlebox 160.
- the arrangement of the middlebox 160 is referred to as a one-armed out- of-path deployment or a one-arm deployment.
- the middlebox 160 of some embodiments processes the network data and does not send network data nor a copy of the processed network data back to the L3 router 155.
- different embodiments use different techniques and/or criteria to forward and route the network data through the logical network 150. For instance, in some embodiments, packets are routed and/or forwarded through the logical network 150 based on the destination address (e.g., a media access control (MAC) address, an Internet protocol (IP) address, etc.) specified in the packets. Some embodiments employ policy-based routing, which uses additional and/or different criteria to determine the manner in which network data is routed and/or forwarded through the logical network 150. Examples of such criteria include the packet's source address, the size of the packet, the protocol of the packet's payload, and/or any other information available in a packet's header or the packet's payload. Additional and/or other techniques are used in some embodiments.
- MAC media access control
- IP Internet protocol
- Figure 2 conceptually illustrates a physical network architecture that implements the logical network 150 illustrated in Figure 1 according to some embodiments of the invention.
- Figure 2 illustrates an example of implementing the logical network 150 with a set of managed switching elements 265-275 and a centralized middlebox 260.
- the centralized middlebox 260 implements the middlebox 160 in the logical network 150.
- the centralized middlebox 260 of some embodiments performs one or more operations (e.g., transforming, inspecting, filterine. manitmlatine. etc.") on network data for purposes other than forwarding of the network data.
- middleboxes include firewalls, intrusion detection systems, network address translators (e.g., source network address translators (SNATs), destination network address translators (DNATs), etc.), wide area network (WAN) optimizers, etc.
- the centralized middlebox 260 of some embodiments is implemented as a physical device, a set of physical devices (e.g., a cluster of physical devices), a virtual machine, a software application or module running on a computing device or a virtual machine, etc.
- the centralized middlebox 260 and the managed switching elements 265-275 communicate with each of through tunnels (e.g., a generic routing encapsulation (GRE) tunnel, a Control And Provisioning of Wireless Access Points (CAPWAP) tunnel, a web cache communication protocol (WCCP) tunnel, etc.).
- GRE generic routing encapsulation
- CAPWAP Control And Provisioning of Wireless Access Points
- WCCP web cache communication protocol
- the centralized middlebox 260 is used to implement multiple middleboxes (e.g., different middleboxes for the same logical network, different middleboxes for different logical networks, etc.).
- the centralized middlebox 260 of some embodiments creates a middlebox instance (also referred to as a middlebox slice) for each middlebox that the centralized middlebox 260 is requested to implement and associates the middle instance with a unique identifier (e.g., a unique identifier included in the slicing data described below).
- the managed switching elements 265-275 of some embodiments are switching elements that forward and route network data between network elements coupled to the managed switching elements 265-275.
- each of the managed switching elements 265-275 is implemented as a physical switching element, a virtual switching element, a software switching element (e.g., an OVS switching element), or any other type of network element that is capable of forwarding and routing network data.
- the managed switching elements 265-275 are referred to as edge switching elements because they are managed switching elements at the edge of the network infrastructure. That is, the managed switching elements 265-275 are directly connected to network hosts (the VMs 175-195 in this example).
- a user in some embodiments specifies the logical network 150 by providing input that describes an LDPS, which is conceptually represented by the logical network 150 and is implemented by a set of managed switching elements.
- the managed switching elements 265-275 and the centralized middlebox 250 are used to implement the LDPS.
- the network control system of some embodiments receives input from the user and converts the user-provided data into logical control plane (LCP) data, and then converts the LCP data into logical forward plane (LFP) data, which the network control system in turn converts into physical control plane (PCP) data.
- the network control system sends the PCP data to the set of managed switching elements (the managed switching elements 265-275 in this example) to convert to physical forwarding plane (PFP) data in order to implement the LDPS described by the user-provided LCP data.
- LCP logical control plane
- LFP logical forward plane
- PCP physical control plane
- the network control system converts the LFP data to universal PCP (UPCP) data.
- UPCP data in some embodiments is a data plane that enables the control system of some embodiments to scale even when it contains a large number of managed switching elements (e.g., thousands) to implement a LDPS.
- the UPCP abstracts common characteristics of different managed switching elements in order to express PCP data without considering differences in the managed switching elements and/or location specifics of the managed switching elements.
- network control system translates the UPCP data into customized PCP (CPCP) data for each managed switching element in order to completely implement LDPSs at the managed switching elements.
- CPCP customized PCP
- the network control system (1) generates CPCP data for each managed switching element by expanding the UPCP data to characteristics specific and/or local to the managed switching element (e.g., ports on the managed switching element) and (2) sends the CPCP data to the managed switching element.
- the network control system of some embodiments sends the UPCP data to each of the managed switching elements for the managed switching element to each generate its own CPCP data, which is used to generate PFP data for the managed switching element.
- the network control system of some embodiments uses the OpenFlow or OVS application programming interfaces (APIs) provided by the managed switching elements.
- APIs application programming interfaces
- the user provides to the network control system middlebox configuration data for configuring the middlebox 160 in the logical network 150. For instance, when the user specifies for the middlebox 160 to serve as a firewall, the user provides filters (e.g., packet filters, stateful filters, application layer filters, etc.) for the middlebox 160. As another example, when the user specifies the middlebox 160 to serve as a load balancer, the user provides network address data (e.g., virtual IPs, real IPs, application layer filters, etc.) and/or load balancing data (e.g., balancing aleorithm. port rules, etc.”) for the middlebox 160.
- filters e.g., packet filters, stateful filters, application layer filters, etc.
- load balancer e.g., load balancer
- the network control system of some embodiments pushes the user-provided middlebox configuration data to the middlebox through a set of APIs provided by the middlebox.
- the network control system also pushes attachment data along with the middlebox configuration data to the middlebox through the set of APIs.
- the attachment data for the centralized middlebox 260 includes a tunnel type (e.g., a GRE tunnel, a CAP WAP tunnel, a WCCP tunnel, etc.) for the centralized middlebox 260 to use for sending to and receiving from network data to each of the managed switching elements 265-275.
- the tunnel type is specified by the user as part of the middlebox configuration data in some embodiments while the network control system automatically determines the tunnel type in other embodiments.
- the network control system generates slicing data for the centralized middlebox 260 and pushes this data along with the middlebox configuration data to the centralized middlebox 260 through the set of APIs.
- the slicing data of some embodiments includes a unique identifier associated with a middlebox in a logical network (e.g., the middlebox 160 in the logical network 150 described above by reference to Figure 1).
- the centralized middlebox 260 uses the unique identifiers of slicing data to implement (1) different middleboxes for a particular logical network and/or (2) different middleboxes for multiple different logical networks.
- FIG. 2 shows the centralized middlebox 260 directly connected to the managed switching elements 265-275 (via tunnels).
- the managed switching elements 265-275 are directly connected to the VMs 175-195, which are not directly connected to the centralized middlebox 260. Therefore, network data that is specified to be sent to the centralized middlebox 260 must pass through the managed switching elements 265-275. For instance, network data communicated between any of the VMs 180-190 in the physical network architecture and the centralized middlebox 260 is sent through the managed switching elements 270 in order to reach the centralized middlebox 260. That is, the managed switching element 270 forwards the network data received from the VMs 180-190 to the centralized middlebox 260.
- the centralized middlebox 260 When the network data reaches the centralized middlebox 260, the centralized middlebox 260 performs its configured functions on the network data. Based on the configured functions of the centralized middlebox 260, the centralized middlebox 260 of some embodiments sends the network data (or a copy of the network data) to a pool node (not shown in Figure 2), such as the pool node described by below bv reference to Figure 3. to perform the first-hop logical processing on the network data and forward the network data to its destination (e.g. one of the VMs 170-190) while, the centralized middlebox 260 of other embodiments does not send the network data back to the managed switching element 270.
- a pool node not shown in Figure 2
- the centralized middlebox 260 of other embodiments does not send the network data back to the managed switching element 270.
- the centralized middlebox 260 forwards the network data to its destination (e.g. one of the VMs 170-190). For instance, in some embodiments where the managed switching elements 265-275 and the centralized middlebox 260 are used to implement a logical network that includes a logical L2 switch and a logical middlebox, the centralized middlebox 260 of some embodiments performs the logical processing (i.e. L2 logical processing) on the network data. Based on the logical forwarding decision, the centralized middlebox 260 forwards the network data to the appropriate managed switching element for forwarding to its destination (e.g. one of the VMs 170-190)
- the centralized middlebox 260 forwards the network data to the appropriate managed switching element for forwarding to its destination (e.g. one of the VMs 170-190)
- Figure 3 conceptually illustrates a physical network architecture that implements the logical network illustrated in Figure 1 according to some embodiments of the invention. Specifically, Figure 3 illustrates an example of implementing the logical network 150 with a set of software switching elements and a distributed middlebox.
- the physical network architecture Figures 3 illustrates a pool node 350 and hosts 360-380.
- the hosts 360-380 are physical machines (e.g., computing devices, such as computer system) in some embodiments.
- the hosts 360-380 each includes a software switching element referred to as an Open Virtual Switch (OVS) for forwarding and routing network data between network elements coupled to the OVSs 365- 385 (the VMs 175-195 and the pool node 350 in this example).
- OVSs 365-385 operate in a virtual machine running on the hosts 360-380.
- the OVSs 365-385 of some embodiments are referred to as edge switching elements because they are managed switching elements at the edge of the network infrastructure. That is, the OVSs 365-385 are directly connected to network hosts (the VMs 175-195 in this example).
- a non-edge switching element (the pool node 350 in this example) is a switching element that interconnects the edge switching elements.
- non-edge switching elements are referred to as interior switching elements.
- the pool node 350 and the OVSs 365-385 are referred to as managed switching elements as they are managed by a network control system in some embodiments (as opposed to unmanaged switches, which are not managed by the network control system, in the network) in order to implement the logical network 150.
- Each of the OVSs 365-385 communicates with each of the other OVSs through tunnels (e.e.. a GRE tunnel, a CAPWAP tunnel, a WCCP tunnel, etc.) in some embodiments.
- the pool node 350 is a managed switching element located at the network interior (i.e., not directly connected to any of the VMs 175-195) that facilitates communication between the VMs 175-195 by processing packets received from the OVSs 365-385 that the OVSs 365-385 cannot process.
- the pool node 350 is implemented as a physical machine (e.g., a computing device, such as computer system) while, in other embodiments, the pool node 350 is implemented as a virtual machine (not shown in Figure 3) running on a physical machine.
- the pool node 350 of some embodiments includes an OVS (not shown in Figure 3) for forwarding and routing network data between network elements coupled to the pool node 350 (the OVSs 365-375 in this example).
- the pool node 350 and the OVSs 365-375 communicate with each other through a tunnel (e.g., a generic routing encapsulation (GRE) tunnel, a Control And Provisioning of Wireless Access Points (CAPWAP) tunnel, a web cache communication protocol (WCCP) tunnel, etc.).
- GRE generic routing encapsulation
- CAPWAP Control And Provisioning of Wireless Access Points
- WCCP web cache communication protocol
- a user in some embodiments specifies the logical network 150 by providing input that describes an LDPS, which is conceptually represented by the logical network 150 and is implemented by a set of managed switching elements.
- the OVSs 365-385 and the pool node 350 are used to implement the LDPS.
- the network control system of some embodiments receives input from the user and converts the user-provided data into LCP data, and then converts the LCP data into LFP data, which the network control system in turn converts into PCP data.
- the network control system sends the PCP data to the managed switching elements to convert to PFP data in order to implement the LDPS described by the user-provided LCP data.
- the network control system converts the LFP data to universal
- PCP (UPCP) data in some embodiments is a data plane that enables the control system of some embodiments to scale even when it contains a large number of managed switching elements (e.g., thousands) to implement a LDPS.
- the UPCP abstracts common characteristics of different managed switching elements in order to express PCP data without considering differences in the managed switching elements and/or location specifics of the managed switching elements.
- network control system translates the UPCP data into customized PCP (CPCP) data for each managed switching element in order to completely implement LDPSs at the managed switching elements.
- CPCP customized PCP
- the network control system (1) generates CPCP data for each managed switching element by expanding the UPCP data to characteristics specific and/or local to the managed switching element (e.g., ports on the managed switching element) and (2) sends the CPCP data to the managed switching element.
- the network control system of some embodiments sends the UPCP data to each of the managed switching elements for the managed switching elements to each generate its own CPCP data, which is used to generate PFP data for the managed switching element.
- the network control system of some embodiments uses the OpenFlow or OVS APIs provided by the managed switching elements.
- the middlebox 160 in the logical network 150 illustrated in Figure 1 is implemented in a distributed manner by middlebox element 305, which is running on host 360, middlebox element 310, which is running on host 365, and middlebox element 315, which is running on host 380.
- the middlebox elements 305-315 function collectively as a single middlebox that implements the middlebox 160 in the logical network 150 to performs one or more operations (e.g., transforming, inspecting, filtering, manipulating, etc.) on network data for purposes other than forwarding of the network data.
- each of the middlebox elements 305-315 is implemented as a software application or module running on a virtual machine on the corresponding hosts 360-380.
- a middlebox when a user specifies a middlebox for a logical network, the user also provides input for configuring the middlebox. For example, when the user specifies a wide area network (WAN) optimizer or an intrusion detection system (IDS), the user provides a set of policies that specifies the type of network data to forward to the WAN optimizer or IDS for processing. The user provides different configuration data for different middleboxes in different embodiments.
- WAN wide area network
- IDS intrusion detection system
- the network control system described above that is used to configure and provision the OVSs 365-385 to implement the logical network 150 is used to provision the middlebox elements 305-315 in some embodiments.
- the network control system identifies a set of nodes (e.g., hosts) over which the middlebox configuration should be implemented, and distributes the configuration to these nodes (e.g., through a set of controllers). For this example, the user provides to the network control system middlebox configuration data for configuring the middlebox 160 in the logical network 150.
- the network control svstem of some embodiments pushes the user-provided middlebox configuration data to each of the middlebox elements 305-315 through a set of APIs provided by the middlebox element.
- the network control system also pushes attachment data for the middlebox elements 305-315 with the middlebox configuration data to each of the middlebox elements 305-315 through the set of APIs.
- attachment data for each middlebox element 305-315 includes a software port of the managed switching element operating in the same host as the middlebox element.
- the network control system generates slicing data for the middlebox elements 305-315 and pushes this data along with the middlebox configuration data to each of the middlebox elements 305-315 through the set of APIs.
- the slicing data of some embodiments includes a unique identifier associated with a middlebox in a logical network (e.g., the middlebox 160 in the logical network 150 described above by reference to Figure 1).
- the middlebox elements 305-315 uses the unique identifiers of slicing data to implement (1) different middleboxes for a particular logical network and/or (2) different middleboxes for multiple different logical networks.
- Figure 3 illustrates the middlebox 160 in the logical network 150 implemented by the middlebox elements 305-315 running on hosts 360-380.
- the middlebox element and the OVS operating on the same host e.g., the middlebox element 305 and the OVS 365, the middlebox element 310 and the OVS 375, or the middlebox element 315 and the OVS 385) negotiate a software port on the OVS through which to transfer network data.
- the OVS receives network data that is specified to be forwarded to the middlebox element, the OVS forwards the network data through the software port to the managed switching element.
- the middlebox element in some embodiments sends the network data (or a copy of the network data) back to the OVS through the negotiated software port. In some embodiments, the middlebox element does not send the network data back to the OVS.
- the network control system of some embodiments manages a set of switching elements in the physical network infrastructure in order to implement LDPSs (i.e., logical networks).
- Figure 4 conceptually illustrates a managed network architecture of some embodiments that is used to implement a logical network (e.g., the logical network 150 described above by reference to Figure 1). Specifically, Figure 4 illustrates a user 400, a logical controller 405, physical controllers 410 and 415, managed switching elements 420- 435, and a middlebox 440.
- each of the controllers in a network control system has the capability to function as a logical controller and/or physical controller.
- a given controller may only have the functionality to operate as a particular one of the types of controller (e.g., as a physical controller).
- different combinations of controllers may run in the same physical machine. For instance, the logical controller 405 and the physical controller 410 may run in the same computing device, with which a user interacts.
- the logical controller 405 in some embodiments is responsible for implementing LDPSs by computing UPCP data (e.g., universal flow entries that are generic expressions of flow entries) for the physical controllers 410 and 415 and the managed switching elements 420-435 to implement the LDPSs.
- UPCP data e.g., universal flow entries that are generic expressions of flow entries
- more than one logical controller can be masters of the same LDPS in some embodiments.
- a logical controller of some embodiments can be the master of more than one LDPS.
- a user specifies a logical network by providing input that describes an LDPS.
- the input might be related to creating a logical network, modifying the logical network, and/or deleting the logical network in some embodiments.
- the logical controller 405 allows the user 400 to specify a logical network through the logical controller 405.
- the user 400 may also provide policy-based routing data that specifies the type of network data to be optimized by the middlebox.
- the logical controller 405 includes an input module (not shown in Figure 4), such as an input translation application, for translating the input provided by the user 400 into LCP data while, in other embodiments, the input module runs on a separate controller and the logical controller 405 receives the LCP data from the input module on the separate controller.
- the logical controller 405 of some embodiments provides the user input to the input module in the form of API calls.
- the logical controller 405 also includes a control module (e.g., a control application) that generates LFP data from the LCP data output by the input module.
- the logical controller 405 of some embodiments further includes a virtualization module (e.g., a virtualization application) that generates UPCP from the LFP data output by the control module and sends the UPCP data to the physical controllers 410 and 415.
- a virtualization module e.g., a virtualization application
- a logical controller identifies a set of physical controllers that are masters of the managed switching elements that implement LDPSs.
- the managed switching elements 420-435 are responsible for implementing LDPSs and, thus, the logical controller 405 identifies the physical controllers 410 and 415 and sends each of the physical controllers 410 and 415 the generated UPCP data.
- only one physical controller manages a particular managed switching element.
- the physical controllers 410 and 415 of some embodiments generate CPCP data (e.g., customized flow entries from universal flow entries) and push these CPCP data down to the managed switching elements 420-435 and the middlebox 440.
- the physical controllers 410 and 415 push the UPCP data to the managed switching elements 420-435 and the managed switching elements 420-435 each generates CPCP data for its own respective managed switching element.
- the physical controllers 410 and 415 access the managed switching elements 420-435 by using the OpenFlow or OVS APIs provided by the switching elements.
- the physical controller 415 manages the middlebox 440, which is a centralized middlebox in this example.
- the physical controller 415 of some embodiments pushes user-provided middlebox configuration data to the middlebox 440 through a set of APIs provided by the middlebox 440.
- the physical controller 415 also pushes attachment data to the middlebox 440 through the set of APIs.
- the attachment data in some embodiments includes a tunnel type (e.g., a GRE tunnel, a CAPWAP tunnel, a WCCP tunnel, etc.) for the middlebox 440 to use for sending to and receiving from network data to each of the managed switching elements 420-435.
- a tunnel type e.g., a GRE tunnel, a CAPWAP tunnel, a WCCP tunnel, etc.
- the tunnel type is specified by the user as part of the middlebox configuration data while, in other embodiments, the physical controller 415 automatically determines the tunnel type.
- the physical controller 415 generates slicing data for the middlebox 440 and pushes this data along with the middlebox configuration data to the middlebox 440 through the set of APIs.
- the slicing data of some embodiments includes a unique identifier associated with a middlebox in a logical network (e.g., the middlebox 160 in the logical network 150 described above by reference to Figure 1).
- the managed switching elements of some embodiments handle the implementation of LDPSs.
- the managed switching elements 420- 435 implement LDPSs by generating PFP data based on the CPCF that the managed switching elements 420-435 receives from the physical controllers 410 and 415.
- the managed switching elements 420-435 of some embodiments receives UPCP data from the physical controllers 410 and 415.
- each of the managed switching elements 420-435 generates CPCP data from the UPCP data and then generates the PFP data from the generated CPCP data.
- the middlebox 440 receives configuration data from the physical controller 415 and, in response, translates the configuration data info a form that is usable by the middlebox 440.
- the middlebox configuration data is in a particular language that expresses the packet processing, analysis, modification, etc. rules.
- the middlebox 440 of some such embodiments compiles these rules into more optimized packet classification rules. In some embodiments, this transformation is similar to the PCP data to PFP data translation.
- the middlebox 440 applies the compiled optimized rules in order to efficiently and quickly perform its operations on the packet.
- the middlebox 440 is a physical device, a set of physical devices (e.g., a cluster of physical devices), a software application or module running on a computing device or a virtual machine, etc.
- the middlebox 440 of some embodiments is used for implementing multiple middleboxes responsible (e.g., different middleboxes for the same logical network, different middleboxes for different logical networks, etc.).
- the middlebox 440 creates and manages a middlebox instance for operating on the middlebox 440.
- the middlebox 440 receives through an API a request from the physical controller 415 to create a middlebox instance 445, the middlebox 440 instantiates a middlebox instance 445 and configures it using the middlebox data received from the physical controller 415.
- the middlebox 440 of some embodiments provides state information and/or statistical information to the user of the network control system.
- the middlebox 440 receives requests for such information from the physical controller 415 (or the logical controller 405 in some embodiments) through API calls, the middlebox 440 sends to the physical controller 415 (or the logical controller 405 in some embodiments) the requested state information and/or statistical information regarding the middlebox 440.
- the logical controller 405, the physical controllers 410 and 415, and the managed switching elements 420-435 use a table matmine eneine referred to as nLog that is based on a variation of the datalog database language in order to generate the different types of data (e.g., LCP data, LFP data, UPCP data, CPCP data, PFP data, WAN configuration data, etc.).
- nLog table matmine eneine
- the logical controller 405 inputs LCP data to an input table of the table mapping engine of some embodiments and the table mapping engine automatically generates LFP data, which the table mapping engine stores in one of its output tables. Details of the table mapping engine of some embodiments are described below by reference to Figure 6.
- the managed network architecture illustrated in Figure 4 processes non-user changes to LDPSs.
- the logical controller 405 computes UPCP data based on the changes and propagates the UPCP to the physical controllers 410 and 415 to in turn propagate to the managed switching elements 420- 435 and the middlebox 440.
- Figure 5 conceptually illustrates an example flow of configuration data for the managed network architecture illustrated in Figure 4 according to some embodiments of the invention.
- the left side of Figure 5 illustrates the flow of configuration data for a LPDS
- the right side of Figure 5 illustrates the flow of configuration data for the middlebox 440.
- the logical controller 405 receives network configuration data (from a user) through a set of APIs provided by the logical controller 405.
- the network configuration data in this example describes an LDPS (i.e., a logical network, such at the logical network 150).
- the logical controller 405 includes an input module (not shown in Figure 5), such as an input translation application, for generating LCP data from the network configuration data while, in other embodiments, the input module runs on a separate controller and the logical controller 405 receives the LCP data from the input module on the separate controller.
- the logical controller 405 of some embodiments provides the network configuration data to the input module through a set of API calls.
- the logical controller 405 generates the UPCP data from the LCP data by converting the LCP data to LFP data and then converting the LFP data to UPCP.
- the logical controller 405 includes a control module (not shown in Figure 5) that is responsible for generating the LFP data from the LCP data and a virtualization module (not shown in Figure 5) that handles the generation of the UPCP data from the LFP data.
- the logical controller 405 sends the generated UPCP data to the physical controllers 410 and 415.
- the physical controllers 410 and 415 generate, from the received UPCP data, CPCP data for each of the managed switching elements 420-435 and sends the CPCP data to each of the managed switching elements 420- 435.
- the physical controllers 410 and 415 communicate with and configure the managed switching elements 420-435 through the OpenFlow or OVS APIs provided by the managed switching elements 420-435.
- the physical controllers 410 and 415 of some embodiments also sends attachment data and slicing data along with the CPCP data to the managed switching elements 420-435.
- the attachment data of some embodiments includes a tunnel type (e.g., a GRE tunnel, a CAP WAP tunnel, a WCCP tunnel, etc.) for the middlebox 440 to use for sending and receiving network data to each of the managed switching elements 420-435.
- the tunnel type is specified by the user as part of the middlebox configuration data while, in other embodiments, the physical controller 415 automatically determines the tunnel type.
- the physical controller 415 generates the slicing data for the middlebox 440 and pushes this data along with the middlebox configuration data to the middlebox 440 through the set of APIs.
- the slicing data of some embodiments includes a unique identifier associated with a middlebox in a logical network (e.g., the middlebox 160 in the logical network 150 described above by reference to Figure 1).
- the middlebox 440 uses the unique identifiers of slicing data to implement (1) different middleboxes for a particular logical network and/or (2) different middleboxes for multiple different logical networks.
- each of the managed switching elements 420-435 adds slicing information to a packet.
- the slicing information is a tag that indicates a middlebox instance in the middlebox 440 for the middlebox 440 to use to process the packet.
- the managed switching element 420-435 when the managed switching element receives the CPCP data, the managed switching element generates PFP data for implementing the LDPS. Instead of sending CPCP data, in some embodiments, the physical controllers 410 and 415 send the UPCP data to the managed switching elements 420-435.
- the managed switching elements 420-435 of some such embodiments each generates its own CPCP data from the UPCP data and then generates the PFP data from the generated CPCP data.
- the right side of Figure 5 shows that the network configuration data provided through a set of APIs to the logical controller 405 also includes middlebox configuration data. As shown, the logical controller 405 receives the middlebox configuration data and sends it to the physical controllers 410 and 415. Then, the physical controllers 410 and 415 forward the middlebox configuration data along with the attachment data and slicing data that the physical controllers 410 and 415 generated to the middlebox 440 through a set of API calls.
- the middlebox 440 translates the middlebox configuration data. For instance, in some embodiments, the middlebox configuration data will be received in a particular language to express the packet processing, analysis, modification, etc. rules.
- the middlebox 440 of some such embodiments translates the middlebox configuration data by compiling these rules into more optimized packet classification rules. In some embodiments, this transformation is similar to the physical control plane to physical forwarding plane data translation.
- the middlebox 440 applies the compiled optimized rules in order to efficiently and quickly perform its operations on the packet.
- the slicing data generated by the physical controller 415 includes of a unique identifier associated with a middlebox in a logical network.
- the middlebox 440 implements multiple middleboxes.
- the packet includes a prepended tag (e.g., similar to a virtual local area network (VLAN) tag) that identifies a middlebox instance in the middlebox 440 for the middlebox 440 to use for processing the packet.
- VLAN virtual local area network
- the middlebox 440 translates this slicing information into an internal slice binding.
- the middlebox uses its own internal identifiers (different from the tags prepended to the packets) in order to identify states (e.g., active TCP connections, statistics about various IP addresses, etc.) within the middlebox.
- states e.g., active TCP connections, statistics about various IP addresses, etc.
- the middlebox 440 Upon receiving (1) a request to create a middlebox instance and (2) an external identifier (the unique identifier used on the packets) for the middlebox instance, the middlebox 440 of some embodiments automatically creates the middlebox instance and assigns the middlebox instance an internal identifier.
- the middlebox stores a binding for the middlebox instance that maps the external slice identifier to the internal slice identifier.
- Figure 6 illustrates example architecture of a network controller (e.g., a logical controller or a physical controller) 600.
- the network controller of some embodiments uses a table mapping engine to map data from an input set of tables to data in an output set of tables.
- the input set of tables in a controller include logical control plane (LCP) data to be mapped to logical forwarding plane (LFP) data, LFP data to be mapped to universal physical control plane (UPCP) data, and/or UPCP data to be mapped to customized physical control plane (CPCP) data.
- LCP logical control plane
- UPCP universal physical control plane
- CPCP customized physical control plane
- the input set of tables may also include middlebox configuration data to be sent to another controller and/or a distributed middlebox instance.
- the network controller 600 includes input tables 615, an rules engine 610, output tables 620, an importer 630, an exporter 635, a translator 635, and a persistent data storage (PTD) 640.
- PTD
- the input tables 615 include tables with different types of data depending on the role of the controller 600 in the network control system. For instance, when the controller 600 functions as a logical controller for a user's logical forwarding elements, the input tables 615 include LCP data and LFP data for the logical forwarding elements. When the controller 600 functions as a physical controller, the input tables 615 include LFP data.
- the input tables 615 also include middlebox configuration data received from the user or another controller. The middlebox configuration data is associated with a logical datapath set parameter that identifies the logical switching elements to which the middlebox to be is integrated.
- control application 600 includes other miscellaneous tables (not shown) that the rules engine 610 uses to gather inputs for its table mapping operations.
- These miscellaneous tables tables include constant tables that store defined values for constants that the rules engine 610 needs to perform its table mapping operations (e.g., the value 0, a dispatch port number for resubmits, etc.).
- the miscellaneous tables further include function tables that store functions that the rules engine 610 uses to calculate values to populate the output tables 625.
- the rules engine 610 performs table mapping operations that specifies one manner for converting input data to output data. Whenever one of the input tables is modified (referred to as an input table event), the rules engine performs a set of table mapping operations that may result in the modification of one or more data tuples in one or more output tables.
- the rules engine 610 includes an event processor (not shown), several query plans (not shown), and a table processor (not shown). Each query plan is a set of rules that specifies a set of join operations that are to be performed upon the occurrence of an input table event.
- the event processor of the rules engine 610 detects the occurrence of each such event.
- the event processor registers for callbacks with the input tables for notification of changes to the records in the input tables 615. and detects an input table event by receiving a notification from an input table when one of its records has changed.
- the event processor In response to a detected input table event, the event processor (1) selects an appropriate query plan for the detected table event, and (2) directs the table processor to execute the query plan.
- the table processor In some embodiments, performs the join operations specified by the query plan to produce one or more records that represent one or more sets of data values from one or more input and miscellaneous tables.
- the table processor of some embodiments then (1) performs a select operation to select a subset of the data values from the record(s) produced by the join operations, and (2) writes the selected subset of data values in one or more output tables 620.
- nLog uses a variation of the datalog database language to allow application developers to create the rules engine for the controller, and thereby to specify the manner by which the controller maps logical datapath sets to the controlled physical switching infrastructure.
- This variation of the datalog database language is referred to herein as nLog.
- nLog provides a few declaratory rules and operators that allow a developer to specify different operations that are to be performed upon the occurrence of different events.
- nLog provides a limited subset of the operators that are provided by datalog in order to increase the operational speed of nLog. For instance, in some embodiments, nLog only allows the AND operator to be used in any of the declaratory rules.
- nLog engine The declaratory rules and operations that are specified through nLog are then compiled into a much larger set of rules by an nLog compiler.
- this compiler translates each rule that is meant to address an event into several sets of database join operations.
- Collectively the larger set of rules forms the table mapping rules engine that is referred to as the nLog engine.
- Some embodiments designate the first join operation that is performed by the rules engine for an input event to be based on the logical datapath set parameter. This designation ensures that the rules engine's join operations fail and terminate immediately when the rules engine has started a set of join operations that relate to a logical datapath set (i.e., to a logical network) that is not managed by the controller.
- the output tables 620 include tables with different types of data depending on the role of the controller 600.
- the output tables 615 include LFP data and UPCP data for the logical switching elements.
- the output tables 620 include CPCP data.
- the output tables 615 may also include the middlebox configuration data.
- the output tables 615 may include a slice identifier when the controller 600 functions as a physical controller.
- the output tables 620 can be grouped into several different categories.
- the output tables 620 can be rules engine (RE) input tables and/or RE output tables.
- An output table is a RE input table when a change in the output table causes the rules engine to detect an input event that requires the execution of a query plan.
- An output table can also be an RE input table that generates an event that causes the rules engine to perform another query plan.
- An output table is a RE output table when a change in the output table causes the exporter 625 to export the change to another controller or a MSE.
- An output table can be an RE input table, a RE output table, or both an RE input table and a RE output table.
- the exporter 625 detects changes to the RE output tables of the output tables 620. In some embodiments, the exporter registers for callbacks with the RE output tables for notification of changes to the records of the RE output tables. In such embodiments, the exporter 625 detects an output table event when it receives notification from a RE output table that one of its records has changed.
- the exporter 625 takes each modified data tuple in the modified RE output tables and propagates this modified data tuple to one or more other controllers or to one or more MSEs.
- the exporter uses a single channel of communication (e.g., a RPC channel) to send the data contained in the records.
- the exporter uses two channels. One channel is established using a switch control protocol (e.g., OpenFlow) for writing flow entries in the control plane of the MSE.
- the other channel is established using a database communication protocol (e.g., JSON) to send configuration data (e.g., port configuration, tunnel information).
- the controller 600 does not keep in the output tables 620 the data for logical datapath sets that the controller is not responsible for managing (i.e., for logical networks managed by other logical controllers). However, such data is translated by the translator 635 into a format that can be stored in the PTD 640 and is then stored in the PTD. The PTD 640 propagates this data to PTDs of one or more other controllers so that those other controllers that are responsible for managing the logical datapath sets can process the data. In some embodiments, the controller also brings the data stored in the output tables 620 to the PTD for resiliency of the data. Therefore, in these embodiments, a PTD of a controller has all the configuration data for all logical datapath sets managed by the network control system. That is, each PTD contains the global view of the configuration of the logical networks of all users.
- the importer 630 interfaces with a number of different sources of input data and uses the input data to modify or create the input tables 610.
- the importer 620 of some embodiments receives the input data from another controller.
- the importer 620 also interfaces with the PTD 640 so that data received through the PTD from other controller instances can be translated and used as input data to modify or create the input tables 610.
- the importer 620 also detects changes with the RE input tables in the output tables 630.
- Figure 7 conceptually illustrates a software architecture of a middlebox 700 of some embodiments.
- Figure 7 illustrates the middlebox 700, a physical controller 725, and a logical network 730 implemented by managed switching elements 735-745.
- the middlebox 700 is used to implement each middlebox element of a distributed middlebox (e.g., the middlebox elements 305-315 for the distributed middlebox described above in Figure 3).
- the middlebox 700 of some embodiments is used to implement a centralized middlebox (e.g., the middlebox 260 described above by reference to Figure 2 or the middlebox 440 described above by reference to Figure 4).
- the middlebox 700 is implemented as a physical device, a set of physical devices (e.g., a cluster of physical devices), a virtual machine operating on a computer device, a software application or module running on a computing device or a virtual machine, a process (e.g., a process within a hypervisor), etc.
- the middlebox 700 is used to implement multiple middleboxes (e.g., different middleboxes for the same logical network, different middleboxes for different logical networks, etc.).
- the middlebox 700 of some embodiments employs a slicing technique to facilitate the implementation of multiple middleboxes on the middlebox 700.
- the middlebox 700 creates a middlebox instance that operates on the middlebox 700 for each middlebox that the middlebox 700 implements.
- the managed switching element of some embodiments appends (e.g., prepends) a slice identifier (or tag) on the packet to identifv a middlebox instance in the middlebox 700 to process the packet.
- the middlebox 700 uses the slice identifier to identify the middlebox instance that corresponds to the slice identifier and processes the packet using the identified middlebox instance.
- the middlebox 700 includes a control plane 705, a control plane interface 710, a data plane 715, and a data plane interface 720.
- the control plane interface 710 receives data for creating and configuring a middlebox instance for implementing a middlebox in a logical network.
- a user in some embodiments specifies middlebox configuration data for configuring a middlebox in a logical network.
- the user provides this configuration data to a logical controller of network control system that forwards the middlebox configuration data to a physical controller of the network control system, which forwards the configuration data to the middlebox.
- control plane interface 710 provides a set of APIs for receiving middlebox configuring data from the physical controller 725.
- the set of APIs of some embodiments are implemented as a web service for receiving middlebox configuration data from the physical controller 725 over a communication protocol (e.g., a hypertext transfer protocol secure (HTTPS) protocol).
- HTTPS hypertext transfer protocol secure
- the middlebox configuration data is represented using JavaScript Object Notation (JSON), Extensible Markup Language (XML), etc.
- the middlebox configuration data includes tunnel data for establishing a tunnel to each managed switching element with which the centralized middlebox communicates.
- the tunnel data is represented by a data structure that specifies an IP address of the managed switching element with which to establish a tunnel, a tunnel type of the tunnel (e.g., (e.g., a VLAN tunnel, a stateless transport tunneling (STT) tunnel, a GRE tunnel, a CAPWAP tunnel, a WCCP tunnel, etc.)), and an encapsulation label.
- the encapsulation label includes an identifier (e.g., slicing data) that identifies a middlebox instance in the middlebox 700. The identified middlebox instance is used for processing packets having slice identifiers that match the encapsulation label's identifier.
- the centralized middlebox when network data reaches a centralized middlebox, the centralized middlebox performs its configured functions on the network data.
- the centralized middlebox of different embodiments handles the network data forwarding differently. For instance, the centralized middlebox of some embodiments sends the network data (or a copy of the network data) to a pool node (e.g., the pool node described bv below bv reference to Figure 3) to perform the first-hop logical processing on the network data and forward the network data to its destination.
- a pool node e.g., the pool node described bv below bv reference to Figure 3
- the centralized middlebox performs the first-hop logical processing on the network data and forwards the network data to its destination. For example, in some embodiments where a logical network includes a logical L2 switch and a logical middlebox, the centralized middlebox of some embodiments performs the logical processing (i.e. L2 logical processing) on the network data. Based on the logical forwarding decision, the centralized middlebox forwards the network data to the appropriate managed switching element for forwarding to its destination.
- logical processing i.e. L2 logical processing
- control plane interface 710 is used to collect data related to middlebox slices in the middlebox 700 and to provide the data to a user (e.g., the user that configured the logical network).
- data related to middlebox slices includes state information and statistical information related to the middlebox slices in the middlebox 700. Different embodiments store the data differently. Some embodiments use a table, a database, a hash table, etc.
- the control plane interface 710 of some embodiments provides APIs that allow both synchronous (also referred to as blocking) operations and asynchronous (also referred to as non-blocking) operations.
- synchronous also referred to as blocking
- non-blocking also referred to as non-blocking
- the middlebox 700 of some embodiments does not complete a packet processing operation before the state update for the state of a middlebox slice is disseminated for other middlebox slices that require access to the state. Thus, if a particular middlebox fails, the other middlebox slices is able to carry over the packet processing without any impact to end-user traffic.
- the middlebox 700 of some embodiments performs packet processing operations independently from the dissemination of state updates.
- the control plane interface 710 of some embodiments provides primitives to manage data related to the middlebox slices (active and inactive middlebox slices).
- the control plane interface 710 receives requests to invoke primitives from the physical controller 725 while, in other embodiments, the control plane interface 710 receives requests to invoke the primitives from the logical controller responsible for implementing of the logical network. Yet, in some embodiments, the control plane interface 710 receives requests to invoke primitives from both the physical controller 725 and the logical controller.
- the control plane interface 710 sends query results for primitives that query for information to the physical controller 725 while, in other embodiments, the control plane interface 710 sends the query results to the logical controller.
- the primitives provided by the control plane interface 710 of some embodiments include a put primitive for adding and/or modifying state information related to a middlebox slice, a remove primitive for removing state information related to a middlebox slice, a get primitive for querying state information related to a middlebox slice, and a configuration primitive for querying configuration information related to a middlebox slice.
- the put primitive requires a slice identifier for identifying the middlebox slice, a key identifier for identifying an attribute of the middlebox slice, a state identifier for specifying a state of the attribute of the middlebox slice, time-to-live data specifying an amount of time for the state of the attribute lives before being removed, and a blocking flag for specifying the mode of operation (e.g., asynchronous mode, synchronous mode, etc.) for performing the put primitive.
- the mode of operation e.g., asynchronous mode, synchronous mode, etc.
- the remove primitive in some embodiments requires a slice identifier for identifying the middlebox slice, a key identifier for identifying an attribute of the middlebox slice, and a blocking flag for specifying the mode of operation (e.g., asynchronous mode, synchronous mode, etc.) for performing the remove primitive.
- a slice identifier for identifying the middlebox slice
- a key identifier for identifying an attribute of the middlebox slice
- a blocking flag for specifying the mode of operation (e.g., asynchronous mode, synchronous mode, etc.) for performing the remove primitive.
- Using the get primitive to query state information related to a middlebox slice in the middlebox 700 requires a slice identifier for identifying the middlebox slice, a key identifier for identifying an attribute of the middlebox slice, and a blocking flag for specifying the mode of operation (e.g., asynchronous mode, synchronous mode, etc.) for performing the remove primitive.
- a mode of operation e.g., asynchronous mode, synchronous mode, etc.
- the configuration primitive of some embodiments is for querying configuration information related to a middlebox slice in the middlebox 700.
- the configuration primitive requires a slice identifier for identifying the middlebox slice.
- the control plane interface 710 of some embodiments provides statistical information related to middlebox slices in the middlebox 700 through APIS.
- the middlebox 700 of different embodiments provide different types of statistical data.
- the control plane interface 710 of some embodiments provides information about throughput for public load- balanced virtual IPs and protocols, packets per second numbers for public load-balanced virtual IPs and protocols, connection statistics regarding active load-balanced connections, etc.
- control plane interface 710 of some embodiments provides information about connection statistics regarding the active connections, summary statistics regarding current passing network traffic, statistics for a firewall rule (e.g., the number of connections denied and/or accepted based on the firewall rule), etc.
- the control plane 705 manages the middlebox instances in the middlebox 700. For example, when the control plane 705 receives middlebox configuration data for a middlebox in a logical network (through the control plane interface 710), the control plane 705 creates a middlebox instance. When creating a middlebox instance, the control plane 705 of some embodiments compiles rules (e.g., packet processing, analysis, modification, etc. rules) for a middlebox specified in a logical network (e.g., the logical network 730 in this example) into more optimized packet classification rules that the data plane 715 uses to process packets.
- rules e.g., packet processing, analysis, modification, etc. rules
- control plane 705 assigns the optimized packet classification rules an internal unique identifier and stores a mapping that binds (e.g., associates) the assigned internal unique identifier with the slice identifier associated with the middlebox in the logical network.
- control plane 705 of some embodiments creates a middlebox instance when the control plane 705 receives middlebox configuration data for a middlebox in a logical network. In some embodiments, the control plane 705 of some embodiments creates a middlebox instance when the control plane 705 receives a slice identifier from the physical controller 725.
- Figure 8 conceptually illustrates a technique for creating a middlebox instance according to some embodiments of the invention. Specifically, Figure 8 illustrate the middlebox 700 at three different stages 805-815 that show creating a middlebox instance in response to receiving a slice identifier.
- the first stage 805 shows that the middlebox 700 has middlebox instances 1, 2, and 3.
- the middlebox 700 includes a set of mappings 820 that each associates an internal unique identifier (referred to as a middlebox instance identifier in this example) assigned to a middlebox instance with a slice identifier that identifies a middlebox in a logical network.
- the set of mappings 820 includes a mapping that associates a slice identifier "D" with an internal unique identifier "1”, a mapping that associates a slice identifier "H” with an internal unique identifier "2”, and a mapping that associates a slice identifier "M” with an internal unique identifier "3".
- the set of mappings 820 are stored in a volatile storage (e.g., random access memory (RAM)), a nonvolatile storage, in a database (e.g., a relational database), etc.
- a volatile storage e.g., random access memory (RAM)
- a nonvolatile storage e.g., in a database
- database e.g., a relational database
- the second stage 810 illustrates the middlebox 700 receiving a request to create a middlebox instance.
- the physical controller 725 is sending the middlebox 700 a command (using a Create Middlebox command in this example) for creating a middlebox instance associated with a slice identifier "Y".
- the middlebox 700 e.g., the control plane 710 creates a middlebox instance when the middlebox 700 receives the command from the physical controller 725.
- the third stage 815 shows the middlebox 700 after the middlebox 700 creates a middlebox instance in response to the command illustrated in the second stage 810.
- the middlebox 700 e.g., the control plane 710 assigns the created middlebox instance an internal unique identifier "4".
- the middlebox 700 e.g., the control plane 710) then adds a mapping to the set of mappings 820 that associates the slice identifier "Y" with the internal unique identifier "4".
- the middlebox 700 includes a feature for dynamically learning middlebox slices.
- the middlebox 700 of some such embodiments learns slices by analyzing packets receiving over the data plane interface and detecting when slices appear and disappear.
- the middlebox 700 provides the slice learning feature when the middlebox 700 implements a middlebox that requires little to no configuration in order to operate. Examples of such middleboxes include a middlebox for accelerating network data, a middlebox for caching network data, etc.
- Figure 9 conceptually illustrates another technique for creating a middlebox instance according to some embodiments of the invention.
- Figure 9 illustrate the middlebox 700 at three different stages 905-915 that show dynamically creating a middlebox instance in response receiving a packet with an unknown slice identifier.
- the first stage 905 is similar to the first stage 805 described above by reference to Figure 8 except the first stage 905 shows the managed switching element 735 coupled to the middlebox 700 instead of the physical controller 725. Accordingly, the middlebox 700 at this stage the set of mappings 820 that associates the slice identifier "D" with the internal unique identifier "1", the slice identifier "H” with the internal unique identifier "2", and the slice identifier "M” with the internal unique identifier "3".
- the second stage 910 illustrates the middlebox 700 receiving a packet from the managed switching element 735 (through a tunnel in some embodiments).
- the middlebox 700 e.g., the data plane interface 720
- the middlebox 700 processes the packet and identifies the slice identifier in the packet.
- the middlebox 700 examines the set of mappings 820 to determine whether it contains a mapping with the slice identifier in the packet. As shown, the packet in this example has a slice identifier "Y" and the set of mappings 820 does not include a mapping with a slice identifier "Y".
- the middlebox 700 determines that the set of mappings 820 does not contain a mapping with the slice identifier in the packet, the middlebox 700 (e.g., the control plane 710) automatically creates a middlebox instance (e.g., using a default configuration or no configuration at all), assigns the created middlebox instance an internal unique identifier, and adds a mapping to the set of mappings 820 that associates the slice identifier of the packet with the internal unique identifier.
- a middlebox instance e.g., using a default configuration or no configuration at all
- the third stage 915 shows the middlebox 700 after the middlebox 700 dynamically creates a middlebox instance in response to determining that the middlebox 700 does not have a middlebox instance associated with the packet illustrated in the second stage 910. For this example, when the middlebox 700 creates the middlebox instance, the middlebox 700
- the middlebox 700 (e.g., the control plane 710) assigns the created middlebox instance an internal unique identifier "4".
- the middlebox 700 (e.g., the control plane 710) then adds a mapping to the set of mappings 820 that associates the slice identifier "Y" with the internal unique identifier "4"
- the data plane interface 720 is for receiving packets forwarded from the logical network 730 (e.g., based on policies specified for the logical network 730).
- the data plane interface 720 of different embodiments receives packets from different managed switching elements 735-745. For instance, in some embodiments where a centralized middlebox implementation is used, the data plane interface 720 receives packets from all of the managed switching elements 735-745. However, for some embodiments in which a distributed middlebox implementation is used, the data plane interface 720 receives packets from only one of the managed switching elements 735-745.
- the middlebox 700 of some embodiments when used to implement a middlebox element running on a host illustrated in Figure 3 (e.g., the middlebox element 305, the middlebox element 310, or the middlebox element 315), the data plane interface 720 of such middlebox 700 receives packets from the OVS operating on the same host as the middlebox 700.
- a middlebox element running on a host illustrated in Figure 3
- the data plane interface 720 of such middlebox 700 receives packets from the OVS operating on the same host as the middlebox 700.
- the data plane interface 720 of some embodiments is also for sending processed packets back to the logical network 730.
- the middlebox 700 processes the packets received from the logical network 730 and sends the processed packets back to the logical network 730.
- the middlebox 700 sends a copy of the processed packets (as new packets) back to the logical network 730.
- the data plane 715 of the middlebox 700 is for processing the packets received from the logical network 730 (through the data plane interface 720).
- the data plane 715 accesses middlebox 700 's mappings to identify the mapping that associates the internal unique identifier associated with the slice identifier specified in the network data.
- the data plane 715 then applies to the network data the compiled optimized rules to which the internal unique identifier in the identified mapping is assigned, in order to efficiently and quickly process the network data.
- the middlebox 700 is implemented on a machine (e.g., a computing device or a virtual machine) that includes a kernel and a user space (e.g., a kernel and a user space of an operating system, such as Linux, running on the machine.).
- a machine e.g., a computing device or a virtual machine
- a kernel and a user space e.g., a kernel and a user space of an operating system, such as Linux, running on the machine.
- the middlebox 700 implement the middlebox 700 on the machine differently.
- the data plane 715 and the data plane interface 720 operate in the kernel of the machine while the control plane 705 and the control plane interface 710 operate in the user space of the machine.
- the middlebox 700 of some embodiments is implemented with the data plane 715, the data plane interface 715, the control plane 705, and the control plane interface 710 all operating in the user space of the kernel.
- the kernel exposes a set of network interfaces that is substantially or completely controllable by the user space (e.g., using a role in the user space that gives sufficient privileges to control the set of network interfaces).
- Computer readable storage medium also referred to as computer readable medium.
- these instructions are executed by one or more computational or processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions.
- computational or processing unit(s) e.g., one or more processors, cores of processors, or other processing units
- Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, random access memory (RAM) chips, hard drives, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), etc.
- the computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- the term "software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage which can be read into memory for processing by a processor.
- multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions.
- multiple software inventions can also be implemented as separate programs.
- any combination of separate programs that together implement a software invention described here is within the scope of the invention.
- the software programs when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
- FIG. 10 conceptually illustrates an electronic system 1000 with which some embodiments of the invention are implemented.
- the electronic system 1000 may be a computer (e.g., a desktop computer, personal computer, tablet computer, etc.), phone, PDA, or any other sort of electronic or computing device.
- Such an electronic system includes various types of computer readable media and interfaces for various other types of computer readable media.
- Electronic system 1000 includes a bus 1005, processing unit(s) 1010, a graphics processing unit (GPU) 1015, a system memory 1020, a network 1025, a read-only memory 1030, a permanent storage device 1035, input devices 1040, and output devices 1045.
- GPU graphics processing unit
- the bus 1005 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 1000.
- the bus 1005 communicatively connects the processing unit(s) 1010 with the readonly memory 1030, the GPU 1015, the system memory 1020, and the permanent storage device 1035.
- the processing unit(s) 1010 retrieves instructions to execute and data to process in order to execute the processes of the invention.
- the processing unit(s) may be a single processor or a multi-core processor in different embodiments. Some instructions are passed to and executed by the GPU 1015.
- the GPU 1015 can offload various computations or complement the image processing provided by the processing unit(s) 1010.
- the read-only-memory (ROM) 1030 stores static data and instructions that are needed by the processing unit(s) 1010 and other modules of the electronic system.
- the permanent storage device 1035 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the electronic system 1000 is off. Some embodiments of the invention use a mass-storaee device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1035.
- the system memory 1020 is a read-and- write memory device. However, unlike storage device 1035, the system memory 1020 is a volatile read-and- write memory, such a random access memory.
- the system memory 1020 stores some of the instructions and data that the processor needs at runtime.
- the invention's processes are stored in the system memory 1020, the permanent storage device 1035, and/or the read-only memory 1030. From these various memory units, the processing unit(s) 1010 retrieves instructions to execute and data to process in order to execute the processes of some embodiments.
- the bus 1005 also connects to the input and output devices 1040 and 1045.
- the input devices 1040 enable the user to communicate information and select commands to the electronic system.
- the input devices 1040 include alphanumeric keyboards and pointing devices (also called “cursor control devices"), cameras (e.g., webcams), microphones or similar devices for receiving voice commands, etc.
- the output devices 1045 display images generated by the electronic system or otherwise output data.
- the output devices 1045 include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD), as well as speakers or similar audio output devices. Some embodiments include devices such as a touchscreen that function as both input and output devices.
- bus 1005 also couples electronic system 1000 to a network 1025 through a network adapter (not shown).
- the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of electronic system 1000 may be used in conjunction with the invention.
- Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer- readable medium (alternatively referred to as computer-readable storage media, machine - readable media, or machine-readable storage media).
- computer- readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g.. SD cards. mini-SD cards.
- the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
- Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- PLDs programmable logic devices
- ROM read only memory
- RAM random access memory
- the terms "computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
- display or displaying means displaying on an electronic device.
- the terms "computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Certains modes de réalisation de la présente invention prévoient un support informatisé non transitoire d'un premier élément de boîtier intermédiaire de plusieurs éléments de boîtiers intermédiaires, permettant de mettre en œuvre une instance de boîtier intermédiaire d'une manière distribuée chez plusieurs hôtes. Le support informatisé non transitoire contient un ensemble d'instructions pour la réception (1) de données de configuration permettant de configurer l'instance de boîtier intermédiaire pour mettre en œuvre un boîtier intermédiaire sur un réseau logique et (2) un identifiant particulier associé au boîtier intermédiaire sur le réseau logique. Le support informatisé non transitoire contient un ensemble d'instructions pour produire (1) un ensemble de règles pour le traitement des paquets pour le boîtier intermédiaire dans le réseau logique et (2) un identifiant interne associé à l'ensemble de règles. Le support informatisé non transitoire contient un ensemble d'instructions pour associer l'identifiant particulier à l'identifiant interne en vue du traitement ultérieur des paquets ayant l'identifiant particulier.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161560279P | 2011-11-15 | 2011-11-15 | |
US61/560,279 | 2011-11-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013074855A1 true WO2013074855A1 (fr) | 2013-05-23 |
Family
ID=48280562
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/065364 WO2013074847A1 (fr) | 2011-11-15 | 2012-11-15 | Migration d'un état de dispositif intermédiaire pour les dispositifs intermédiaires répartis |
PCT/US2012/065341 WO2013074828A1 (fr) | 2011-11-15 | 2012-11-15 | Pare-feu dans des réseaux logiques |
PCT/US2012/065339 WO2013074827A1 (fr) | 2011-11-15 | 2012-11-15 | Architecture de réseaux à boîtiers intermédiaires |
PCT/US2012/065359 WO2013074842A1 (fr) | 2011-11-15 | 2012-11-15 | Attribution d'identifiants de connexion et traduction d'adresses réseau sources |
PCT/US2012/065361 WO2013074844A1 (fr) | 2011-11-15 | 2012-11-15 | Middleboxes d'équilibrage de charges et de traduction d'adresse réseau de destination |
PCT/US2012/065383 WO2013074855A1 (fr) | 2011-11-15 | 2012-11-15 | Interface de plan de contrôle pour services logiques de boîtier intermédiaire |
PCT/US2012/065345 WO2013074831A1 (fr) | 2011-11-15 | 2012-11-15 | Système de commande de réseau pour configuration de boîtiers intermédiaires |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/065364 WO2013074847A1 (fr) | 2011-11-15 | 2012-11-15 | Migration d'un état de dispositif intermédiaire pour les dispositifs intermédiaires répartis |
PCT/US2012/065341 WO2013074828A1 (fr) | 2011-11-15 | 2012-11-15 | Pare-feu dans des réseaux logiques |
PCT/US2012/065339 WO2013074827A1 (fr) | 2011-11-15 | 2012-11-15 | Architecture de réseaux à boîtiers intermédiaires |
PCT/US2012/065359 WO2013074842A1 (fr) | 2011-11-15 | 2012-11-15 | Attribution d'identifiants de connexion et traduction d'adresses réseau sources |
PCT/US2012/065361 WO2013074844A1 (fr) | 2011-11-15 | 2012-11-15 | Middleboxes d'équilibrage de charges et de traduction d'adresse réseau de destination |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/065345 WO2013074831A1 (fr) | 2011-11-15 | 2012-11-15 | Système de commande de réseau pour configuration de boîtiers intermédiaires |
Country Status (6)
Country | Link |
---|---|
US (27) | US10514941B2 (fr) |
EP (8) | EP2748716B1 (fr) |
JP (5) | JP5898780B2 (fr) |
CN (3) | CN103917967B (fr) |
AU (2) | AU2012340383B2 (fr) |
WO (7) | WO2013074847A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8913611B2 (en) | 2011-11-15 | 2014-12-16 | Nicira, Inc. | Connection identifier assignment and source network address translation |
Families Citing this family (454)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8881099B2 (en) * | 2004-09-10 | 2014-11-04 | Oracle International Corporation | Dynamic generation of wrapper classes to implement call-by-value semantics |
US8392684B2 (en) | 2005-08-12 | 2013-03-05 | Silver Peak Systems, Inc. | Data encryption in a network memory architecture for providing data based on local accessibility |
US8171238B1 (en) | 2007-07-05 | 2012-05-01 | Silver Peak Systems, Inc. | Identification of data stored in memory |
US8095774B1 (en) | 2007-07-05 | 2012-01-10 | Silver Peak Systems, Inc. | Pre-fetching data into a memory |
US8489562B1 (en) * | 2007-11-30 | 2013-07-16 | Silver Peak Systems, Inc. | Deferred data storage |
US8929402B1 (en) | 2005-09-29 | 2015-01-06 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data by predicting subsequent data |
US8811431B2 (en) | 2008-11-20 | 2014-08-19 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data |
US8885632B2 (en) | 2006-08-02 | 2014-11-11 | Silver Peak Systems, Inc. | Communications scheduler |
US8755381B2 (en) | 2006-08-02 | 2014-06-17 | Silver Peak Systems, Inc. | Data matching using flow based packet data storage |
US8307115B1 (en) | 2007-11-30 | 2012-11-06 | Silver Peak Systems, Inc. | Network memory mirroring |
US10164861B2 (en) | 2015-12-28 | 2018-12-25 | Silver Peak Systems, Inc. | Dynamic monitoring and visualization for network health characteristics |
US10805840B2 (en) | 2008-07-03 | 2020-10-13 | Silver Peak Systems, Inc. | Data transmission via a virtual wide area network overlay |
US9717021B2 (en) | 2008-07-03 | 2017-07-25 | Silver Peak Systems, Inc. | Virtual network overlay |
US8743683B1 (en) | 2008-07-03 | 2014-06-03 | Silver Peak Systems, Inc. | Quality of service using multiple flows |
US9344331B2 (en) * | 2011-05-25 | 2016-05-17 | Trend Micro Incorporated | Implementation of network device components in network devices |
US9130991B2 (en) | 2011-10-14 | 2015-09-08 | Silver Peak Systems, Inc. | Processing data packets in performance enhancing proxy (PEP) environment |
US9626224B2 (en) | 2011-11-03 | 2017-04-18 | Silver Peak Systems, Inc. | Optimizing available computing resources within a virtual environment |
KR102006179B1 (ko) * | 2011-12-15 | 2019-08-02 | 삼성전자주식회사 | 단말간 통신을 위한 접속 식별자 할당 방법 및 장치 |
CN104106237B (zh) * | 2012-02-10 | 2017-08-11 | 日本电气株式会社 | 计算机***和虚拟网络可视化方法 |
US9425987B2 (en) | 2012-02-10 | 2016-08-23 | Nec Corporation | Computer system and visualization method of virtual network |
US9264295B1 (en) | 2012-03-02 | 2016-02-16 | Big Switch Networks, Inc. | Systems and methods for forwarding broadcast network packets with a controller |
CN107743093B (zh) * | 2012-03-19 | 2020-11-03 | 英特尔公司 | 用于输入/输出虚拟化***中分组管理的装置、方法和介质 |
US9350671B2 (en) * | 2012-03-22 | 2016-05-24 | Futurewei Technologies, Inc. | Supporting software defined networking with application layer traffic optimization |
WO2013158920A1 (fr) * | 2012-04-18 | 2013-10-24 | Nicira, Inc. | Echange d'informations sur l'état d'un réseau entre des éléments de transfert |
US9237188B1 (en) | 2012-05-21 | 2016-01-12 | Amazon Technologies, Inc. | Virtual machine based content processing |
US8789135B1 (en) * | 2012-06-15 | 2014-07-22 | Google Inc. | Scalable stateful firewall design in openflow based networks |
US10560343B1 (en) | 2012-07-06 | 2020-02-11 | Cradlepoint, Inc. | People centric management of cloud networks via GUI |
US10880162B1 (en) | 2012-07-06 | 2020-12-29 | Cradlepoint, Inc. | Linking logical broadcast domains |
US10135677B1 (en) | 2012-07-06 | 2018-11-20 | Cradlepoint, Inc. | Deployment of network-related features over cloud network |
US10177957B1 (en) | 2012-07-06 | 2019-01-08 | Cradlepoint, Inc. | Connecting a cloud network to the internet |
US10601653B2 (en) | 2012-07-06 | 2020-03-24 | Cradlepoint, Inc. | Implicit traffic engineering |
US10110417B1 (en) | 2012-07-06 | 2018-10-23 | Cradlepoint, Inc. | Private networks overlaid on cloud infrastructure |
US9992062B1 (en) | 2012-07-06 | 2018-06-05 | Cradlepoint, Inc. | Implicit traffic engineering |
EP2874358A4 (fr) * | 2012-07-13 | 2016-03-23 | Nec Corp | Dispositif de contrôle, système de communication, procédé de communication, et programme |
US8972971B2 (en) | 2012-08-09 | 2015-03-03 | International Business Machines Corporation | Image instance mapping |
US10430216B1 (en) * | 2012-08-23 | 2019-10-01 | Scale Computing Inc | Virtual machine automated selection |
US9787570B2 (en) * | 2012-10-17 | 2017-10-10 | Verizon Patent And Licensing Inc. | Dynamic feature peer network for application flows |
US20140115126A1 (en) * | 2012-10-19 | 2014-04-24 | Electronics And Telecommunications Research Institute | System for controlling and verifying open programmable network and method thereof |
US9813295B2 (en) * | 2012-11-02 | 2017-11-07 | International Business Machines Corporation | Wireless network optimization appliance |
WO2014077614A1 (fr) * | 2012-11-19 | 2014-05-22 | Samsung Sds Co., Ltd. | Système anti-programmes malveillants, procédé de traitement de données dans ledit système, et dispositif informatique |
US9417922B2 (en) * | 2012-12-03 | 2016-08-16 | Cutting Edge Consulting Associates, Inc. | Systems and methods for protecting an identity in network communications |
US9253117B1 (en) | 2012-12-18 | 2016-02-02 | Google Inc. | Systems and methods for reducing network hardware of a centrally-controlled network using in-band network connections |
US8989194B1 (en) * | 2012-12-18 | 2015-03-24 | Google Inc. | Systems and methods for improving network redundancy and for facile initialization in a centrally-controlled network |
JP6417942B2 (ja) * | 2013-01-04 | 2018-11-07 | 日本電気株式会社 | 制御装置、通信システム、トンネルエンドポイントの制御方法及びプログラム |
US9372726B2 (en) | 2013-01-09 | 2016-06-21 | The Research Foundation For The State University Of New York | Gang migration of virtual machines using cluster-wide deduplication |
US9350558B2 (en) | 2013-01-09 | 2016-05-24 | Dell Products L.P. | Systems and methods for providing multicast routing in an overlay network |
US9203806B2 (en) | 2013-01-11 | 2015-12-01 | Centripetal Networks, Inc. | Rule swapping in a packet network |
US9817728B2 (en) | 2013-02-01 | 2017-11-14 | Symbolic Io Corporation | Fast system state cloning |
FR3001849B1 (fr) * | 2013-02-05 | 2016-06-24 | Byo Networks | Procede pour router des donnees, programme d'ordinateur, controleur de reseau et reseaux associes |
US9395960B2 (en) * | 2013-02-19 | 2016-07-19 | PLUMgrid, Inc. | Method and system for data plane abstraction to enable a dynamic creation of network applications |
US10547505B2 (en) * | 2013-03-01 | 2020-01-28 | Nokia Solutions And Networks Oy | Software defined networking for edge nodes |
US9258254B2 (en) * | 2013-03-15 | 2016-02-09 | Oracle International Corporation | Virtual router and switch |
AU2014101656A4 (en) * | 2013-03-21 | 2019-08-01 | Storone Ltd. | Deploying data-path-related plugins |
US10291515B2 (en) | 2013-04-10 | 2019-05-14 | Huawei Technologies Co., Ltd. | System and method for a control plane reference model framework |
US9436716B2 (en) * | 2013-05-07 | 2016-09-06 | PLUMgrid, Inc. | Method and system for data plane abstraction to enable a network storage platform ecosystem |
US9225638B2 (en) | 2013-05-09 | 2015-12-29 | Vmware, Inc. | Method and system for service switching using service tags |
US10218622B2 (en) * | 2013-05-13 | 2019-02-26 | Vmware, Inc. | Placing a network device into a maintenance mode in a virtualized computing environment |
CN104184842A (zh) * | 2013-05-24 | 2014-12-03 | 中兴通讯股份有限公司 | 一种转发报文的方法及装置 |
US9521028B2 (en) * | 2013-06-07 | 2016-12-13 | Alcatel Lucent | Method and apparatus for providing software defined network flow distribution |
EP3014810A4 (fr) * | 2013-06-25 | 2016-12-21 | Ditno Pty Ltd | Procédé et système pour gérer un pare-feu basé sur un hôte |
JPWO2014208538A1 (ja) * | 2013-06-25 | 2017-02-23 | 日本電気株式会社 | 通信システムと装置と方法とプログラム |
US9344349B2 (en) * | 2013-07-12 | 2016-05-17 | Nicira, Inc. | Tracing network packets by a cluster of network controllers |
US9282019B2 (en) | 2013-07-12 | 2016-03-08 | Nicira, Inc. | Tracing logical network packets through physical network |
US9979622B2 (en) * | 2013-07-30 | 2018-05-22 | Cisco Technology, Inc. | Elastic WAN optimization cloud services |
US9887960B2 (en) | 2013-08-14 | 2018-02-06 | Nicira, Inc. | Providing services for logical networks |
US9374308B2 (en) | 2013-08-30 | 2016-06-21 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Openflow switch mode transition processing |
US9577845B2 (en) | 2013-09-04 | 2017-02-21 | Nicira, Inc. | Multiple active L3 gateways for logical networks |
US9503371B2 (en) * | 2013-09-04 | 2016-11-22 | Nicira, Inc. | High availability L3 gateways for logical networks |
WO2015041651A1 (fr) | 2013-09-19 | 2015-03-26 | Hewlett-Packard Development Company, L.P. | Réseau sdn optique |
US10033693B2 (en) | 2013-10-01 | 2018-07-24 | Nicira, Inc. | Distributed identity-based firewalls |
US20150100560A1 (en) | 2013-10-04 | 2015-04-09 | Nicira, Inc. | Network Controller for Managing Software and Hardware Forwarding Elements |
US9977685B2 (en) | 2013-10-13 | 2018-05-22 | Nicira, Inc. | Configuration of logical router |
US9998530B2 (en) | 2013-10-15 | 2018-06-12 | Nicira, Inc. | Distributed global load-balancing system for software-defined data centers |
US9298848B2 (en) * | 2013-11-01 | 2016-03-29 | International Business Machines Corporation | Managing a template in an operator graph |
WO2015069576A1 (fr) * | 2013-11-05 | 2015-05-14 | Cisco Technology, Inc. | Structure de matrice de réseau |
US9634938B2 (en) * | 2013-11-05 | 2017-04-25 | International Business Machines Corporation | Adaptive scheduling of data flows in data center networks for efficient resource utilization |
CN103593322B (zh) * | 2013-11-11 | 2017-07-07 | 曙光信息产业(北京)有限公司 | 驱动组件的配置方法和装置 |
EP3076303A4 (fr) * | 2013-11-26 | 2017-08-09 | Nec Corporation | Système de gestion de middle box virtuelle, procédé de gestion de middle box virtuelle, et programme de gestion de middle box virtuelle |
CN104683428B (zh) | 2013-11-26 | 2019-02-19 | 华为技术有限公司 | 网络业务处理方法与装置 |
EP3068081B1 (fr) * | 2013-12-10 | 2018-10-10 | Huawei Technologies Co., Ltd. | Procédé et appareil de génération de table de flux |
US9407504B1 (en) | 2014-01-15 | 2016-08-02 | Cisco Technology, Inc. | Virtual links for network appliances |
WO2015106421A1 (fr) * | 2014-01-16 | 2015-07-23 | 华为技术有限公司 | Procédé de chargement d'un code et appareil de réseau |
WO2015113291A1 (fr) * | 2014-01-29 | 2015-08-06 | 华为技术有限公司 | Dispositif de traitement de données de réseau sans fil et système de réseau sans fil |
US10282346B1 (en) * | 2014-02-05 | 2019-05-07 | Cisco Technology, Inc. | Scalable network device self-configuration in large networks |
US9215214B2 (en) | 2014-02-20 | 2015-12-15 | Nicira, Inc. | Provisioning firewall rules on a firewall enforcing device |
EP3047613B1 (fr) | 2014-03-04 | 2019-08-21 | Huawei Technologies Co., Ltd. | Transfert de données dépendant de l'état |
WO2015138043A2 (fr) * | 2014-03-14 | 2015-09-17 | Nicira, Inc. | Annonce de route par des passerelles gérées |
US9419855B2 (en) | 2014-03-14 | 2016-08-16 | Nicira, Inc. | Static routes for logical routers |
US9313129B2 (en) * | 2014-03-14 | 2016-04-12 | Nicira, Inc. | Logical router processing by network controller |
US9590901B2 (en) | 2014-03-14 | 2017-03-07 | Nicira, Inc. | Route advertisement by managed gateways |
US9225597B2 (en) | 2014-03-14 | 2015-12-29 | Nicira, Inc. | Managed gateways peering with external router to attract ingress packets |
US9647883B2 (en) | 2014-03-21 | 2017-05-09 | Nicria, Inc. | Multiple levels of logical routers |
WO2015147780A1 (fr) * | 2014-03-24 | 2015-10-01 | Hewlett-Packard Development Company, L.P. | Table de filtrage de port basée sur un client |
US9825854B2 (en) | 2014-03-27 | 2017-11-21 | Nicira, Inc. | Host architecture for efficient cloud service access |
US9794186B2 (en) | 2014-03-27 | 2017-10-17 | Nicira, Inc. | Distributed network address translation for efficient cloud service access |
US9893988B2 (en) | 2014-03-27 | 2018-02-13 | Nicira, Inc. | Address resolution using multiple designated instances of a logical router |
US9338091B2 (en) * | 2014-03-27 | 2016-05-10 | Nicira, Inc. | Procedures for efficient cloud service access in a system with multiple tenant logical networks |
US9503427B2 (en) | 2014-03-31 | 2016-11-22 | Nicira, Inc. | Method and apparatus for integrating a service virtual machine |
US9906494B2 (en) * | 2014-03-31 | 2018-02-27 | Nicira, Inc. | Configuring interactions with a firewall service virtual machine |
US9537751B2 (en) * | 2014-03-31 | 2017-01-03 | Kulcloud | Divided hierarchical network system based on software-defined networks |
US9215210B2 (en) | 2014-03-31 | 2015-12-15 | Nicira, Inc. | Migrating firewall connection state for a firewall service virtual machine |
US9838253B2 (en) * | 2014-04-10 | 2017-12-05 | Fujitsu Limited | Object-oriented network virtualization |
KR102169302B1 (ko) * | 2014-04-30 | 2020-10-23 | 삼성전자주식회사 | 통신 서비스를 제공하기 위한 방법, 단말, 그리고 서버 |
US10277422B2 (en) * | 2014-05-06 | 2019-04-30 | International Business Machines Corporation | Virtual port support in a logical switch architecture |
US9648121B2 (en) * | 2014-05-27 | 2017-05-09 | Ravello Systems Ltd. | Source-destination network address translation (SDNAT) proxy and method thereof |
US10171370B1 (en) * | 2014-05-30 | 2019-01-01 | Amazon Technologies, Inc. | Distribution operating system |
US9825913B2 (en) | 2014-06-04 | 2017-11-21 | Nicira, Inc. | Use of stateless marking to speed up stateful firewall rule processing |
US9729512B2 (en) | 2014-06-04 | 2017-08-08 | Nicira, Inc. | Use of stateless marking to speed up stateful firewall rule processing |
EP3158684B1 (fr) * | 2014-06-17 | 2018-10-24 | Sercel | Méthode et noeud pour la gestion de réseaux |
US9686140B2 (en) * | 2014-07-02 | 2017-06-20 | Verizon Patent And Licensing Inc. | Intelligent network interconnect |
US9948496B1 (en) | 2014-07-30 | 2018-04-17 | Silver Peak Systems, Inc. | Determining a transit appliance for data traffic to a software service |
TW201605198A (zh) | 2014-07-31 | 2016-02-01 | 萬國商業機器公司 | 智慧網路管理裝置以及管理網路的方法 |
CA2959022C (fr) * | 2014-08-22 | 2020-12-08 | Level 3 Communications, Llc | Portail de mise en reseau definie par logiciel |
US10079694B2 (en) * | 2014-08-29 | 2018-09-18 | Nokia Of America Corporation | Scalable virtual networks in SDN-based ethernet networks using VLANs |
US9923827B2 (en) | 2014-09-05 | 2018-03-20 | At&T Intellectual Property I, L.P. | Load balancing and migration of transport connections |
US9875344B1 (en) | 2014-09-05 | 2018-01-23 | Silver Peak Systems, Inc. | Dynamic monitoring and authorization of an optimization device |
CN105471726B (zh) * | 2014-09-05 | 2019-08-27 | 华为技术有限公司 | 转发参数传递的方法及设备 |
US10516608B2 (en) * | 2014-09-11 | 2019-12-24 | Oath Inc. | Systems and methods for directly responding to distributed network traffic |
US10511458B2 (en) | 2014-09-30 | 2019-12-17 | Nicira, Inc. | Virtual distributed bridging |
US9768980B2 (en) | 2014-09-30 | 2017-09-19 | Nicira, Inc. | Virtual distributed bridging |
US10020960B2 (en) | 2014-09-30 | 2018-07-10 | Nicira, Inc. | Virtual distributed bridging |
US10257095B2 (en) | 2014-09-30 | 2019-04-09 | Nicira, Inc. | Dynamically adjusting load balancing |
US9798810B2 (en) | 2014-09-30 | 2017-10-24 | At&T Intellectual Property I, L.P. | Methods and apparatus to track changes to a network topology |
US10225137B2 (en) * | 2014-09-30 | 2019-03-05 | Nicira, Inc. | Service node selection by an inline service switch |
US9935827B2 (en) | 2014-09-30 | 2018-04-03 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US10250443B2 (en) | 2014-09-30 | 2019-04-02 | Nicira, Inc. | Using physical location to modify behavior of a distributed virtual network element |
US9338071B2 (en) | 2014-10-08 | 2016-05-10 | Google Inc. | Locale profile for a fabric network |
US10469342B2 (en) | 2014-10-10 | 2019-11-05 | Nicira, Inc. | Logical network traffic analysis |
US9971619B2 (en) * | 2014-10-15 | 2018-05-15 | Keysight Technologies Singapore (Holdings) Pte Ltd | Methods and systems for forwarding network packets within virtual machine host systems |
US9971620B2 (en) | 2014-10-15 | 2018-05-15 | Keysight Technologies Singapore (Holdings) Pte Ltd | Methods and systems for network packet impairment within virtual machine host systems |
US9985882B2 (en) * | 2014-10-29 | 2018-05-29 | Metaswitch Networks Ltd | Packet data routing |
JP2016092485A (ja) * | 2014-10-30 | 2016-05-23 | 富士通株式会社 | 情報処理システム、管理装置及び情報処理システムの制御方法 |
US20160142285A1 (en) * | 2014-11-13 | 2016-05-19 | Industrial Technology Research Institute | Openflow switch and method for packet exchanging thereof, sdn controller and data flow control method thereof |
CN112906077A (zh) * | 2014-11-14 | 2021-06-04 | Nicira股份有限公司 | 无状态集群边缘上的有状态服务 |
US11533255B2 (en) | 2014-11-14 | 2022-12-20 | Nicira, Inc. | Stateful services on stateless clustered edge |
US9954775B2 (en) * | 2014-11-25 | 2018-04-24 | Electronics And Telecommunications Research Institute | Software-defined network (SDN) system using host abstraction, and method for implementing the same |
US9692727B2 (en) | 2014-12-02 | 2017-06-27 | Nicira, Inc. | Context-aware distributed firewall |
JP2018502385A (ja) | 2014-12-08 | 2018-01-25 | アンブラ テクノロジーズ リミテッドUmbra Technologies Ltd. | 遠隔ネットワークリージョンからのコンテンツ検索のためのシステム及び方法 |
US9733846B1 (en) * | 2014-12-18 | 2017-08-15 | EMC IP Holding Company LLC | Integrated backup performance enhancements by creating affinity groups |
US10681145B1 (en) * | 2014-12-22 | 2020-06-09 | Chelsio Communications, Inc. | Replication in a protocol offload network interface controller |
CN104580168B (zh) * | 2014-12-22 | 2019-02-26 | 华为技术有限公司 | 一种攻击数据包的处理方法、装置及*** |
US10439908B2 (en) | 2014-12-23 | 2019-10-08 | Talari Networks Incorporated | Methods and apparatus for providing adaptive private network centralized management system time correlated playback of network traffic |
US9891940B2 (en) | 2014-12-29 | 2018-02-13 | Nicira, Inc. | Introspection method and apparatus for network access filtering |
CN113225369A (zh) | 2015-01-06 | 2021-08-06 | 安博科技有限公司 | 用于中立应用程序编程接口的***和方法 |
JP2018507639A (ja) * | 2015-01-28 | 2018-03-15 | アンブラ テクノロジーズ リミテッドUmbra Technologies Ltd. | グローバル仮想ネットワークについてのシステム及び方法 |
US10129180B2 (en) * | 2015-01-30 | 2018-11-13 | Nicira, Inc. | Transit logical switch within logical router |
US20160234234A1 (en) * | 2015-02-05 | 2016-08-11 | Cisco Technology, Inc. | Orchestrating the Use of Network Resources in Software Defined Networking Applications |
US10609091B2 (en) | 2015-04-03 | 2020-03-31 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US10038628B2 (en) * | 2015-04-04 | 2018-07-31 | Nicira, Inc. | Route server mode for dynamic routing between logical and physical networks |
US10142287B2 (en) * | 2015-04-06 | 2018-11-27 | Nicira, Inc. | Distributed network security controller cluster for performing security operations |
US9967134B2 (en) | 2015-04-06 | 2018-05-08 | Nicira, Inc. | Reduction of network churn based on differences in input state |
EP4293979A3 (fr) | 2015-04-07 | 2024-04-17 | Umbra Technologies Ltd. | Système et procédé pour interfaces virtuelles et routage intelligent avancé dans un réseau virtuel global |
US10061514B2 (en) | 2015-04-15 | 2018-08-28 | Formulus Black Corporation | Method and apparatus for dense hyper IO digital retention |
US9942058B2 (en) | 2015-04-17 | 2018-04-10 | Nicira, Inc. | Managing tunnel endpoints for facilitating creation of logical networks |
US10374904B2 (en) | 2015-05-15 | 2019-08-06 | Cisco Technology, Inc. | Diagnostic network visualization |
US9971624B2 (en) * | 2015-05-17 | 2018-05-15 | Nicira, Inc. | Logical processing for containers |
US10021066B2 (en) * | 2015-05-18 | 2018-07-10 | Morgan Stanley | Clustered server sharing |
US9916174B2 (en) * | 2015-05-27 | 2018-03-13 | International Business Machines Corporation | Updating networks having virtual machines with migration information |
US9378043B1 (en) * | 2015-05-28 | 2016-06-28 | Altera Corporation | Multilayer quality of service (QOS) for network functions virtualization platforms |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US9967158B2 (en) | 2015-06-05 | 2018-05-08 | Cisco Technology, Inc. | Interactive hierarchical network chord diagram for application dependency mapping |
US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
CN116366334A (zh) | 2015-06-11 | 2023-06-30 | 安博科技有限公司 | 用于网络挂毯多协议集成的***和方法 |
US10554484B2 (en) | 2015-06-26 | 2020-02-04 | Nicira, Inc. | Control plane integration with hardware switches |
US10243848B2 (en) | 2015-06-27 | 2019-03-26 | Nicira, Inc. | Provisioning logical entities in a multi-datacenter environment |
US10348625B2 (en) | 2015-06-30 | 2019-07-09 | Nicira, Inc. | Sharing common L2 segment in a virtual distributed router environment |
US9680706B2 (en) | 2015-06-30 | 2017-06-13 | Nicira, Inc. | Federated firewall management for moving workload across data centers |
US10185599B2 (en) * | 2015-07-07 | 2019-01-22 | Openvpn Technologies, Inc. | Kernel mode accelerator |
US9985837B2 (en) * | 2015-07-23 | 2018-05-29 | Cisco Technology, Inc. | Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center environment |
US9967182B2 (en) | 2015-07-31 | 2018-05-08 | Nicira, Inc. | Enabling hardware switches to perform logical routing functionalities |
US9819581B2 (en) | 2015-07-31 | 2017-11-14 | Nicira, Inc. | Configuring a hardware switch as an edge node for a logical router |
US10230629B2 (en) | 2015-08-11 | 2019-03-12 | Nicira, Inc. | Static route configuration for logical router |
US10154009B2 (en) | 2015-08-11 | 2018-12-11 | At&T Intellectual Property I, L.P. | Providing a basic firewall using a virtual networking function |
US10581976B2 (en) * | 2015-08-12 | 2020-03-03 | A10 Networks, Inc. | Transmission control of protocol state exchange for dynamic stateful service insertion |
US9906560B2 (en) * | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Distributing remote device management attributes to service nodes for service rule processing |
US10075363B2 (en) | 2015-08-31 | 2018-09-11 | Nicira, Inc. | Authorization for advertised routes among logical routers |
US10313186B2 (en) | 2015-08-31 | 2019-06-04 | Nicira, Inc. | Scalable controller for hardware VTEPS |
US9917902B2 (en) * | 2015-09-09 | 2018-03-13 | Honeywell International Inc. | System and method for scalable and efficient deployment of wireless infrastructure nodes for multiple collocated wireless field device networks |
US10985990B2 (en) * | 2015-09-15 | 2021-04-20 | Huawei Technologies Co., Ltd. | Software defined topology (SDT) for user plane |
US9979593B2 (en) | 2015-09-30 | 2018-05-22 | Nicira, Inc. | Logical L3 processing for L2 hardware switches |
US10263828B2 (en) | 2015-09-30 | 2019-04-16 | Nicira, Inc. | Preventing concurrent distribution of network data to a hardware switch by multiple controllers |
US10230576B2 (en) | 2015-09-30 | 2019-03-12 | Nicira, Inc. | Managing administrative statuses of hardware VTEPs |
US10204122B2 (en) | 2015-09-30 | 2019-02-12 | Nicira, Inc. | Implementing an interface between tuple and message-driven control entities |
US9948577B2 (en) | 2015-09-30 | 2018-04-17 | Nicira, Inc. | IP aliases in logical networks with hardware switches |
WO2017075046A1 (fr) * | 2015-10-26 | 2017-05-04 | Nokia Solutions And Networks Oy | Procédé et appareil de décomposition de fonction de réseau virtualisé |
US10095535B2 (en) | 2015-10-31 | 2018-10-09 | Nicira, Inc. | Static route types for logical routers |
US10871981B2 (en) | 2015-11-01 | 2020-12-22 | Nicira, Inc. | Performing logical network functionality within data compute nodes |
US10324746B2 (en) | 2015-11-03 | 2019-06-18 | Nicira, Inc. | Extended context delivery for context-based authorization |
US10250553B2 (en) | 2015-11-03 | 2019-04-02 | Nicira, Inc. | ARP offloading for managed hardware forwarding elements |
US10986039B2 (en) * | 2015-11-11 | 2021-04-20 | Gigamon Inc. | Traffic broker for routing data packets through sequences of in-line tools |
US10462101B2 (en) * | 2015-11-13 | 2019-10-29 | Nanning Fugui Precision Industrial Co., Ltd. | Network communication method based on software-defined networking and server using the method |
US9961014B2 (en) * | 2015-11-13 | 2018-05-01 | Nanning Fugui Precision Industrial Co., Ltd. | Network communication method based on software-defined networking and server using the method |
WO2017098326A1 (fr) | 2015-12-11 | 2017-06-15 | Umbra Technologies Ltd. | Système et procédé de lancement d'informations sur une tapisserie de réseau et granularité d'un marqueur temporel |
US9917799B2 (en) | 2015-12-15 | 2018-03-13 | Nicira, Inc. | Transactional controls for supplying control plane data to managed hardware forwarding elements |
US9992112B2 (en) * | 2015-12-15 | 2018-06-05 | Nicira, Inc. | Transactional controls for supplying control plane data to managed hardware forwarding elements |
US10225149B2 (en) | 2015-12-15 | 2019-03-05 | Nicira, Inc. | Method and tool for diagnosing logical networks |
US9998375B2 (en) * | 2015-12-15 | 2018-06-12 | Nicira, Inc. | Transactional controls for supplying control plane data to managed hardware forwarding elements |
US10063469B2 (en) | 2015-12-16 | 2018-08-28 | Nicira, Inc. | Forwarding element implementation for containers |
US10355969B2 (en) * | 2015-12-25 | 2019-07-16 | KN Install Solutions (N.IRE) Limited | Data driven orchestrated network using a light weight distributed sdn controller |
US10075567B1 (en) | 2016-02-08 | 2018-09-11 | Barefoot Networks, Inc. | Packet generation in the data plane of a forwarding element |
US11038845B2 (en) | 2016-02-23 | 2021-06-15 | Nicira, Inc. | Firewall in a virtualized computing environment using physical network interface controller (PNIC) level firewall rules |
US10873566B2 (en) * | 2016-02-23 | 2020-12-22 | Nicira, Inc. | Distributed firewall in a virtualized computing environment |
WO2017160395A1 (fr) * | 2016-03-14 | 2017-09-21 | Nicira, Inc. | Identification de l'état de réalisation d'entités logiques sur la base d'un numéro de réalisation global |
US10243797B2 (en) * | 2016-03-14 | 2019-03-26 | Nicira, Inc. | Identifying the realization status of logical entities based on a global realization number |
US10313271B2 (en) | 2016-03-16 | 2019-06-04 | At&T Intellectual Property I, L.P. | Providing and using a distributed forwarding service |
EP3223456B1 (fr) | 2016-03-24 | 2018-12-19 | Alcatel Lucent | Procédé pour la migration d'une fonction de réseau virtuel |
JP6992959B2 (ja) | 2016-03-30 | 2022-01-13 | 日本電気株式会社 | 通信処理システム、通信処理装置、通信処理方法および通信処理プログラム |
CN105791315B (zh) * | 2016-04-25 | 2019-05-14 | 网宿科技股份有限公司 | 一种udp协议加速方法和*** |
US11743332B2 (en) | 2016-04-26 | 2023-08-29 | Umbra Technologies Ltd. | Systems and methods for routing data to a parallel file system |
US10333849B2 (en) | 2016-04-28 | 2019-06-25 | Nicira, Inc. | Automatic configuration of logical routers on edge nodes |
CN105978952B (zh) * | 2016-04-28 | 2019-04-30 | 中国科学院计算技术研究所 | 一种基于网络功能虚拟化场景的流迁移方法及*** |
US10135727B2 (en) | 2016-04-29 | 2018-11-20 | Nicira, Inc. | Address grouping for distributed service rules |
US10484515B2 (en) * | 2016-04-29 | 2019-11-19 | Nicira, Inc. | Implementing logical metadata proxy servers in logical networks |
US10348685B2 (en) | 2016-04-29 | 2019-07-09 | Nicira, Inc. | Priority allocation for distributed service rules |
US10841273B2 (en) | 2016-04-29 | 2020-11-17 | Nicira, Inc. | Implementing logical DHCP servers in logical networks |
US11019167B2 (en) | 2016-04-29 | 2021-05-25 | Nicira, Inc. | Management of update queues for network controller |
US10547588B2 (en) | 2016-04-30 | 2020-01-28 | Nicira, Inc. | Method of translating a logical switch into a set of network addresses |
US10091161B2 (en) | 2016-04-30 | 2018-10-02 | Nicira, Inc. | Assignment of router ID for logical routers |
US10944722B2 (en) | 2016-05-01 | 2021-03-09 | Nicira, Inc. | Using activities to manage multi-tenant firewall configuration |
US11171920B2 (en) | 2016-05-01 | 2021-11-09 | Nicira, Inc. | Publication of firewall configuration |
US10205651B2 (en) * | 2016-05-13 | 2019-02-12 | 128 Technology, Inc. | Apparatus and method of selecting next hops for a session |
US10243845B2 (en) | 2016-06-02 | 2019-03-26 | International Business Machines Corporation | Middlebox tracing in software defined networks |
JP6773458B2 (ja) * | 2016-06-08 | 2020-10-21 | 日本電気通信システム株式会社 | パケット処理装置、パケット処理方法、およびプログラム |
US11210121B2 (en) * | 2016-06-09 | 2021-12-28 | Nicira, Inc. | Management of advanced connection state during migration |
US10432484B2 (en) | 2016-06-13 | 2019-10-01 | Silver Peak Systems, Inc. | Aggregating select network traffic statistics |
US10149193B2 (en) | 2016-06-15 | 2018-12-04 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically managing network resources |
US10289438B2 (en) | 2016-06-16 | 2019-05-14 | Cisco Technology, Inc. | Techniques for coordination of application components deployed on distributed virtual machines |
US11258761B2 (en) | 2016-06-29 | 2022-02-22 | Nicira, Inc. | Self-service firewall configuration |
US10153973B2 (en) | 2016-06-29 | 2018-12-11 | Nicira, Inc. | Installation of routing tables for logical router in route server mode |
US11082400B2 (en) | 2016-06-29 | 2021-08-03 | Nicira, Inc. | Firewall configuration versioning |
US10182035B2 (en) | 2016-06-29 | 2019-01-15 | Nicira, Inc. | Implementing logical network security on a hardware switch |
US10560320B2 (en) | 2016-06-29 | 2020-02-11 | Nicira, Inc. | Ranking of gateways in cluster |
US10708183B2 (en) | 2016-07-21 | 2020-07-07 | Cisco Technology, Inc. | System and method of providing segment routing as a service |
US9967056B1 (en) | 2016-08-19 | 2018-05-08 | Silver Peak Systems, Inc. | Forward packet recovery with constrained overhead |
US10397136B2 (en) | 2016-08-27 | 2019-08-27 | Nicira, Inc. | Managed forwarding element executing in separate namespace of public cloud data compute node than workload application |
CA3034809C (fr) * | 2016-08-27 | 2021-07-06 | Nicira, Inc. | Extension d'un systeme de controle de reseau vers un nuage public |
US10333959B2 (en) | 2016-08-31 | 2019-06-25 | Nicira, Inc. | Use of public cloud inventory tags to configure data compute node for logical network |
US10938837B2 (en) | 2016-08-30 | 2021-03-02 | Nicira, Inc. | Isolated network stack to manage security for virtual machines |
US9762619B1 (en) | 2016-08-30 | 2017-09-12 | Nicira, Inc. | Multi-layer policy definition and enforcement framework for network virtualization |
US10454758B2 (en) | 2016-08-31 | 2019-10-22 | Nicira, Inc. | Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP |
US11895177B2 (en) * | 2016-09-30 | 2024-02-06 | Wisconsin Alumni Research Foundation | State extractor for middlebox management system |
US10341236B2 (en) | 2016-09-30 | 2019-07-02 | Nicira, Inc. | Anycast edge service gateways |
US10419394B2 (en) * | 2016-10-24 | 2019-09-17 | Nubeva, Inc. | Providing scalable cloud-based security services |
US10367623B2 (en) * | 2016-10-31 | 2019-07-30 | Cisco Technology, Inc. | Data traffic management in virtual access point (VAP) enabled networks |
US10454836B2 (en) | 2016-11-01 | 2019-10-22 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamically adapting a software defined network |
US10284730B2 (en) | 2016-11-01 | 2019-05-07 | At&T Intellectual Property I, L.P. | Method and apparatus for adaptive charging and performance in a software defined network |
US10505870B2 (en) | 2016-11-07 | 2019-12-10 | At&T Intellectual Property I, L.P. | Method and apparatus for a responsive software defined network |
US10469376B2 (en) | 2016-11-15 | 2019-11-05 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamic network routing in a software defined network |
US10972388B2 (en) | 2016-11-22 | 2021-04-06 | Cisco Technology, Inc. | Federated microburst detection |
US10193862B2 (en) | 2016-11-29 | 2019-01-29 | Vmware, Inc. | Security policy analysis based on detecting new network port connections |
US10039006B2 (en) | 2016-12-05 | 2018-07-31 | At&T Intellectual Property I, L.P. | Method and system providing local data breakout within mobility networks |
US10715607B2 (en) | 2016-12-06 | 2020-07-14 | Nicira, Inc. | Performing context-rich attribute-based services on a host |
US10237123B2 (en) | 2016-12-21 | 2019-03-19 | Nicira, Inc. | Dynamic recovery from a split-brain failure in edge nodes |
US10742746B2 (en) | 2016-12-21 | 2020-08-11 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US10803173B2 (en) | 2016-12-22 | 2020-10-13 | Nicira, Inc. | Performing context-rich attribute-based process control services on a host |
US10812451B2 (en) | 2016-12-22 | 2020-10-20 | Nicira, Inc. | Performing appID based firewall services on a host |
US11032246B2 (en) | 2016-12-22 | 2021-06-08 | Nicira, Inc. | Context based firewall services for data message flows for multiple concurrent users on one machine |
US10802857B2 (en) | 2016-12-22 | 2020-10-13 | Nicira, Inc. | Collecting and processing contextual attributes on a host |
US10805332B2 (en) | 2017-07-25 | 2020-10-13 | Nicira, Inc. | Context engine model |
US10581960B2 (en) | 2016-12-22 | 2020-03-03 | Nicira, Inc. | Performing context-rich attribute-based load balancing on a host |
US10616045B2 (en) | 2016-12-22 | 2020-04-07 | Nicira, Inc. | Migration of centralized routing components of logical router |
US11537419B2 (en) * | 2016-12-30 | 2022-12-27 | Intel Corporation | Virtual machine migration while maintaining live network links |
CN108270823B (zh) * | 2016-12-30 | 2022-02-22 | 华为技术有限公司 | 一种服务提供方法、装置和*** |
CN110741610B (zh) | 2017-01-09 | 2021-11-12 | 马维尔亚洲私人有限公司 | 具有本地交换的端口扩展器 |
US11405335B2 (en) * | 2017-01-13 | 2022-08-02 | Nicira, Inc. | Managing network traffic in virtual switches based on logical port identifiers |
US11044202B2 (en) | 2017-02-06 | 2021-06-22 | Silver Peak Systems, Inc. | Multi-level learning for predicting and classifying traffic flows from first packet data |
US10892978B2 (en) | 2017-02-06 | 2021-01-12 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows from first packet data |
US10771394B2 (en) | 2017-02-06 | 2020-09-08 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows on a first packet from DNS data |
US10257082B2 (en) | 2017-02-06 | 2019-04-09 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows |
US10264075B2 (en) | 2017-02-27 | 2019-04-16 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for multiplexing service information from sensor data |
US10469286B2 (en) | 2017-03-06 | 2019-11-05 | At&T Intellectual Property I, L.P. | Methods, systems, and devices for managing client devices using a virtual anchor manager |
US10200306B2 (en) | 2017-03-07 | 2019-02-05 | Nicira, Inc. | Visualization of packet tracing operation results |
US10708152B2 (en) | 2017-03-23 | 2020-07-07 | Cisco Technology, Inc. | Predicting application and network performance |
US10523512B2 (en) | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US10764141B2 (en) | 2017-03-27 | 2020-09-01 | Cisco Technology, Inc. | Network agent for reporting to a network policy system |
US10594560B2 (en) | 2017-03-27 | 2020-03-17 | Cisco Technology, Inc. | Intent driven network policy platform |
US10250446B2 (en) | 2017-03-27 | 2019-04-02 | Cisco Technology, Inc. | Distributed policy store |
US10873794B2 (en) | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
US11463404B2 (en) * | 2017-04-12 | 2022-10-04 | Avaya Inc. | Quarantined communications processing at a network edge |
US20180302490A1 (en) * | 2017-04-13 | 2018-10-18 | Cisco Technology, Inc. | Dynamic content delivery network (cdn) cache selection without request routing engineering |
US10673751B2 (en) | 2017-04-27 | 2020-06-02 | At&T Intellectual Property I, L.P. | Method and apparatus for enhancing services in a software defined network |
US10819606B2 (en) | 2017-04-27 | 2020-10-27 | At&T Intellectual Property I, L.P. | Method and apparatus for selecting processing paths in a converged network |
US10212289B2 (en) | 2017-04-27 | 2019-02-19 | At&T Intellectual Property I, L.P. | Method and apparatus for managing resources in a software defined network |
US10749796B2 (en) | 2017-04-27 | 2020-08-18 | At&T Intellectual Property I, L.P. | Method and apparatus for selecting processing paths in a software defined network |
US10084825B1 (en) * | 2017-05-08 | 2018-09-25 | Fortinet, Inc. | Reducing redundant operations performed by members of a cooperative security fabric |
US10382903B2 (en) | 2017-05-09 | 2019-08-13 | At&T Intellectual Property I, L.P. | Multi-slicing orchestration system and method for service and/or content delivery |
US10257668B2 (en) | 2017-05-09 | 2019-04-09 | At&T Intellectual Property I, L.P. | Dynamic network slice-switching and handover system and method |
EP3632064B1 (fr) | 2017-05-24 | 2023-01-11 | Telefonaktiebolaget LM Ericsson (publ) | Sélection de table de routage dans un système de routage fondé sur des règles |
US20190020559A1 (en) * | 2017-07-17 | 2019-01-17 | Nicira, Inc. | Distributed health check in virtualized computing environments |
US10680887B2 (en) | 2017-07-21 | 2020-06-09 | Cisco Technology, Inc. | Remote device status audit and recovery |
US10070344B1 (en) | 2017-07-25 | 2018-09-04 | At&T Intellectual Property I, L.P. | Method and system for managing utilization of slices in a virtual network function environment |
CN107491340B (zh) * | 2017-07-31 | 2020-07-14 | 上海交通大学 | 跨物理机的巨型虚拟机实现方法 |
US11570092B2 (en) | 2017-07-31 | 2023-01-31 | Nicira, Inc. | Methods for active-active stateful network service cluster |
US11296984B2 (en) | 2017-07-31 | 2022-04-05 | Nicira, Inc. | Use of hypervisor for active-active stateful network service cluster |
US10567482B2 (en) | 2017-08-24 | 2020-02-18 | Nicira, Inc. | Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table |
US10491516B2 (en) | 2017-08-24 | 2019-11-26 | Nicira, Inc. | Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table |
WO2019046071A1 (fr) | 2017-08-27 | 2019-03-07 | Nicira, Inc. | Exécution d'un service en ligne dans un nuage public |
US10652281B1 (en) * | 2017-08-31 | 2020-05-12 | Vmware, Inc. | Network policy implementation in a tag-based policy architecture |
US10516650B2 (en) | 2017-09-13 | 2019-12-24 | Netabstraction, Inc. | Dynamic, user-configurable virtual private network |
US11212210B2 (en) | 2017-09-21 | 2021-12-28 | Silver Peak Systems, Inc. | Selective route exporting using source type |
US10437647B2 (en) * | 2017-09-26 | 2019-10-08 | Verizon Patent And Licensing Inc. | Cluster configuration with zero touch provisioning |
US10116671B1 (en) * | 2017-09-28 | 2018-10-30 | International Business Machines Corporation | Distributed denial-of-service attack detection based on shared network flow information |
US10506560B2 (en) | 2017-10-04 | 2019-12-10 | Huawei Technologies Co., Ltd. | Method and apparatus for control layer communication between network nodes having multiple interfaces |
US10608887B2 (en) | 2017-10-06 | 2020-03-31 | Nicira, Inc. | Using packet tracing tool to automatically execute packet capture operations |
EP3692685B1 (fr) * | 2017-10-06 | 2023-04-19 | Telefonaktiebolaget LM Ericsson (publ) | Commande à distance de tranches de réseau dans un réseau |
US10554501B2 (en) | 2017-10-23 | 2020-02-04 | Cisco Technology, Inc. | Network migration assistant |
CN107949019B (zh) * | 2017-10-24 | 2021-09-21 | 上海连尚网络科技有限公司 | 一种无线接入点的负载均衡方法 |
US10523541B2 (en) | 2017-10-25 | 2019-12-31 | Cisco Technology, Inc. | Federated network and application data analytics platform |
US10594542B2 (en) | 2017-10-27 | 2020-03-17 | Cisco Technology, Inc. | System and method for network root cause analysis |
US10797966B2 (en) | 2017-10-29 | 2020-10-06 | Nicira, Inc. | Service operation chaining |
US10511459B2 (en) | 2017-11-14 | 2019-12-17 | Nicira, Inc. | Selection of managed forwarding element for bridge spanning multiple datacenters |
US10374827B2 (en) | 2017-11-14 | 2019-08-06 | Nicira, Inc. | Identifier that maps to different networks at different datacenters |
US10778651B2 (en) | 2017-11-15 | 2020-09-15 | Nicira, Inc. | Performing context-rich attribute-based encryption on a host |
US11012420B2 (en) | 2017-11-15 | 2021-05-18 | Nicira, Inc. | Third-party service chaining using packet encapsulation in a flow-based forwarding element |
US10805420B2 (en) * | 2017-11-29 | 2020-10-13 | Forcepoint Llc | Proxy-less wide area network acceleration |
US10887131B1 (en) * | 2017-11-29 | 2021-01-05 | Riverbed Technology, Inc. | High availability (HA) network device |
US10841192B1 (en) * | 2017-11-29 | 2020-11-17 | Riverbed Technology, Inc. | Estimating data transfer performance improvement that is expected to be achieved by a network optimization device |
US10601705B2 (en) * | 2017-12-04 | 2020-03-24 | Nicira, Inc. | Failover of centralized routers in public cloud logical networks |
US10862753B2 (en) | 2017-12-04 | 2020-12-08 | Nicira, Inc. | High availability for stateful services in public cloud logical networks |
US10572186B2 (en) | 2017-12-18 | 2020-02-25 | Formulus Black Corporation | Random access memory (RAM)-based computer systems, devices, and methods |
US10104548B1 (en) | 2017-12-18 | 2018-10-16 | At&T Intellectual Property I, L.P. | Method and apparatus for dynamic instantiation of virtual service slices for autonomous machines |
US10523748B2 (en) * | 2017-12-22 | 2019-12-31 | A10 Networks, Inc. | Managing health status of network devices in a distributed global server load balancing system |
US10616321B2 (en) | 2017-12-22 | 2020-04-07 | At&T Intellectual Property I, L.P. | Distributed stateful load balancer |
US10791019B2 (en) * | 2017-12-28 | 2020-09-29 | Intel Corporation | Edge or fog gateway assisted out-of-band remote management for managed client devices |
US11233821B2 (en) | 2018-01-04 | 2022-01-25 | Cisco Technology, Inc. | Network intrusion counter-intelligence |
US10574575B2 (en) | 2018-01-25 | 2020-02-25 | Cisco Technology, Inc. | Network flow stitching using middle box flow stitching |
US10999149B2 (en) | 2018-01-25 | 2021-05-04 | Cisco Technology, Inc. | Automatic configuration discovery based on traffic flow data |
US10798015B2 (en) * | 2018-01-25 | 2020-10-06 | Cisco Technology, Inc. | Discovery of middleboxes using traffic flow stitching |
US10826803B2 (en) | 2018-01-25 | 2020-11-03 | Cisco Technology, Inc. | Mechanism for facilitating efficient policy updates |
US10797910B2 (en) | 2018-01-26 | 2020-10-06 | Nicira, Inc. | Specifying and utilizing paths through a network |
US10862773B2 (en) | 2018-01-26 | 2020-12-08 | Nicira, Inc. | Performing services on data messages associated with endpoint machines |
US10802893B2 (en) | 2018-01-26 | 2020-10-13 | Nicira, Inc. | Performing process control services on endpoint machines |
US10659252B2 (en) | 2018-01-26 | 2020-05-19 | Nicira, Inc | Specifying and utilizing paths through a network |
US11128700B2 (en) | 2018-01-26 | 2021-09-21 | Cisco Technology, Inc. | Load balancing configuration based on traffic flow telemetry |
US10044691B1 (en) * | 2018-02-12 | 2018-08-07 | Symantec Corporation | Decrypting network traffic on a middlebox device using a trusted execution environment |
US11153122B2 (en) | 2018-02-19 | 2021-10-19 | Nicira, Inc. | Providing stateful services deployed in redundant gateways connected to asymmetric network |
US10637721B2 (en) | 2018-03-12 | 2020-04-28 | Silver Peak Systems, Inc. | Detecting path break conditions while minimizing network overhead |
TWI668973B (zh) * | 2018-03-23 | 2019-08-11 | 中華電信股份有限公司 | 基於軟件定義網路的可排程安全防護系統及其方法 |
US10805192B2 (en) | 2018-03-27 | 2020-10-13 | Nicira, Inc. | Detecting failure of layer 2 service using broadcast messages |
US10728174B2 (en) | 2018-03-27 | 2020-07-28 | Nicira, Inc. | Incorporating layer 2 service between two interfaces of gateway device |
US11349587B2 (en) * | 2018-03-30 | 2022-05-31 | Intel Corporation | Generating a timestamp |
US11063903B2 (en) * | 2018-04-11 | 2021-07-13 | Vmware, Inc. | Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels |
US10749751B2 (en) * | 2018-05-02 | 2020-08-18 | Nicira, Inc. | Application of profile setting groups to logical network entities |
US10742503B2 (en) * | 2018-05-02 | 2020-08-11 | Nicira, Inc. | Application of setting profiles to groups of logical network entities |
JP6981367B2 (ja) * | 2018-06-04 | 2021-12-15 | 日本電信電話株式会社 | ネットワークシステムおよびネットワーク帯域制御管理方法 |
US10942788B2 (en) | 2018-06-15 | 2021-03-09 | Vmware, Inc. | Policy constraint framework for an sddc |
US10812337B2 (en) | 2018-06-15 | 2020-10-20 | Vmware, Inc. | Hierarchical API for a SDDC |
US11343229B2 (en) | 2018-06-28 | 2022-05-24 | Vmware, Inc. | Managed forwarding element detecting invalid packet addresses |
US10826770B2 (en) * | 2018-07-26 | 2020-11-03 | Cisco Technology, Inc. | Synthesis of models for networks using automated boolean learning |
US11196591B2 (en) | 2018-08-24 | 2021-12-07 | Vmware, Inc. | Centralized overlay gateway in public cloud |
US11374794B2 (en) | 2018-08-24 | 2022-06-28 | Vmware, Inc. | Transitive routing in public cloud |
US20210194803A1 (en) * | 2018-08-27 | 2021-06-24 | Drivenets Ltd. | A System and a Method for Using a Network Cloud Software |
US10708082B1 (en) * | 2018-08-31 | 2020-07-07 | Juniper Networks, Inc. | Unified control plane for nested clusters in a virtualized computing infrastructure |
US10944673B2 (en) | 2018-09-02 | 2021-03-09 | Vmware, Inc. | Redirection of data messages at logical network gateway |
US11595250B2 (en) | 2018-09-02 | 2023-02-28 | Vmware, Inc. | Service insertion at logical network gateway |
KR102160187B1 (ko) | 2018-11-20 | 2020-09-25 | 광주과학기술원 | 에스디엔의 방화벽 전개 장치, 에스디엔의 방화벽 전개 방법, 및 이 장치 또는 방법이 적용되는 네트워크 |
US10931560B2 (en) | 2018-11-23 | 2021-02-23 | Vmware, Inc. | Using route type to determine routing protocol behavior |
GB2579233A (en) * | 2018-11-27 | 2020-06-17 | Edwards Ltd | A method relating to controllers of a vacuum pumping and/or abatement system |
US10735541B2 (en) | 2018-11-30 | 2020-08-04 | Vmware, Inc. | Distributed inline proxy |
US10797998B2 (en) | 2018-12-05 | 2020-10-06 | Vmware, Inc. | Route server for distributed routers using hierarchical routing protocol |
US10938788B2 (en) | 2018-12-12 | 2021-03-02 | Vmware, Inc. | Static routes for policy-based VPN |
US11070475B2 (en) | 2018-12-13 | 2021-07-20 | Google Llc | Transparent migration of virtual network functions |
CN109726593B (zh) * | 2018-12-31 | 2021-02-23 | 联动优势科技有限公司 | 一种数据沙盒的实现方法及装置 |
CN109726592B (zh) * | 2018-12-31 | 2021-02-23 | 联动优势科技有限公司 | 一种数据沙盒的处理方法及装置 |
WO2020142431A1 (fr) | 2019-01-02 | 2020-07-09 | Formulus Black Corporation | Systèmes et procédés de prévention, de gestion et d'atténuation de défaillance de mémoire |
US10944647B2 (en) | 2019-01-24 | 2021-03-09 | Vmware, Inc. | Dynamic inter-cloud placement of virtual network functions for a slice |
US10979314B2 (en) | 2019-01-24 | 2021-04-13 | Vmware, Inc. | Dynamic inter-cloud placement of virtual network functions for a slice |
US11024144B2 (en) * | 2019-02-22 | 2021-06-01 | Vmware, Inc. | Redirecting traffic from mobile device to initial slice selector for connection |
US10929171B2 (en) | 2019-02-22 | 2021-02-23 | Vmware, Inc. | Distributed forwarding for performing service chain operations |
US11146964B2 (en) | 2019-02-22 | 2021-10-12 | Vmware, Inc. | Hierarchical network slice selection |
US11483762B2 (en) | 2019-02-22 | 2022-10-25 | Vmware, Inc. | Virtual service networks |
US11246087B2 (en) | 2019-02-22 | 2022-02-08 | Vmware, Inc. | Stateful network slice selection using slice selector as connection termination proxy |
CN111641515B (zh) * | 2019-03-01 | 2021-11-19 | 华为技术有限公司 | Vnf的生命周期管理方法及装置 |
US11310202B2 (en) | 2019-03-13 | 2022-04-19 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
US10880159B1 (en) * | 2019-03-18 | 2020-12-29 | Amazon Technologies, Inc. | Centralized access of configuration data for computing resources |
US11012288B2 (en) | 2019-05-14 | 2021-05-18 | Vmware, Inc. | Congestion avoidance in a slice-based network |
US11588733B2 (en) * | 2019-05-14 | 2023-02-21 | Vmware, Inc. | Slice-based routing |
US10892994B2 (en) | 2019-05-14 | 2021-01-12 | Vmware, Inc. | Quality of service in virtual service networks |
US10958579B2 (en) | 2019-05-14 | 2021-03-23 | Vmware, Inc. | Congestion avoidance in a slice-based network |
US10897423B2 (en) | 2019-05-14 | 2021-01-19 | Vmware, Inc. | Congestion avoidance in a slice-based network |
CN110134495B (zh) * | 2019-05-21 | 2022-08-12 | 山东大学 | 一种容器跨主机在线迁移方法、存储介质及终端设备 |
US10652081B1 (en) * | 2019-06-24 | 2020-05-12 | Capital One Services, Llc | Facilitating resilient and fault tolerant asynchronous messaging |
US11057348B2 (en) * | 2019-08-22 | 2021-07-06 | Saudi Arabian Oil Company | Method for data center network segmentation |
US11563722B2 (en) * | 2019-08-22 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | Firewall coordination in a network |
US11522764B2 (en) | 2019-08-26 | 2022-12-06 | Vmware, Inc. | Forwarding element with physical and virtual data planes |
US11153119B2 (en) * | 2019-10-15 | 2021-10-19 | Cisco Technology, Inc. | Dynamic discovery of peer network devices across a wide area network |
US11283717B2 (en) | 2019-10-30 | 2022-03-22 | Vmware, Inc. | Distributed fault tolerant service chain |
US11140218B2 (en) | 2019-10-30 | 2021-10-05 | Vmware, Inc. | Distributed service chain across multiple clouds |
CN111092876B (zh) * | 2019-12-12 | 2021-10-01 | 北京首都在线科技股份有限公司 | 多主机***、电子设备、存储介质、用于多主机***的信息处理方法及装置 |
CN113132142B (zh) * | 2019-12-31 | 2022-08-09 | 华为技术有限公司 | 用于获取网络切片标识的方法和装置 |
US11539718B2 (en) | 2020-01-10 | 2022-12-27 | Vmware, Inc. | Efficiently performing intrusion detection |
US11223494B2 (en) | 2020-01-13 | 2022-01-11 | Vmware, Inc. | Service insertion for multicast traffic at boundary |
US11283699B2 (en) | 2020-01-17 | 2022-03-22 | Vmware, Inc. | Practical overlay network latency measurement in datacenter |
US11659061B2 (en) | 2020-01-20 | 2023-05-23 | Vmware, Inc. | Method of adjusting service function chains to improve network performance |
US11153406B2 (en) | 2020-01-20 | 2021-10-19 | Vmware, Inc. | Method of network performance visualization of service function chains |
US11599395B2 (en) | 2020-02-19 | 2023-03-07 | Vmware, Inc. | Dynamic core allocation |
CN113411834B (zh) * | 2020-03-17 | 2023-05-09 | 华为技术有限公司 | 报文处理方法、装置、设备及存储介质 |
CN115380514B (zh) | 2020-04-01 | 2024-03-01 | 威睿有限责任公司 | 为异构计算元件自动部署网络元件 |
US11374817B2 (en) * | 2020-04-06 | 2022-06-28 | Vmware, Inc. | Determining span of logical network element |
US11743172B2 (en) | 2020-04-06 | 2023-08-29 | Vmware, Inc. | Using multiple transport mechanisms to provide services at the edge of a network |
US11394634B2 (en) | 2020-04-06 | 2022-07-19 | Vmware, Inc. | Architecture for stretching logical switches between multiple datacenters |
US11438238B2 (en) | 2020-04-06 | 2022-09-06 | Vmware, Inc. | User interface for accessing multi-site logical network |
US11777793B2 (en) | 2020-04-06 | 2023-10-03 | Vmware, Inc. | Location criteria for security groups |
US11088902B1 (en) | 2020-04-06 | 2021-08-10 | Vmware, Inc. | Synchronization of logical network state between global and local managers |
US11522834B2 (en) | 2020-04-11 | 2022-12-06 | Juniper Networks, Inc. | Autotuning a virtual firewall |
US11425043B2 (en) * | 2020-06-16 | 2022-08-23 | T-Mobile Usa, Inc. | Duplex load balancing for massive IoT applications |
US11616755B2 (en) * | 2020-07-16 | 2023-03-28 | Vmware, Inc. | Facilitating distributed SNAT service |
US11606294B2 (en) | 2020-07-16 | 2023-03-14 | Vmware, Inc. | Host computer configured to facilitate distributed SNAT service |
US11108728B1 (en) | 2020-07-24 | 2021-08-31 | Vmware, Inc. | Fast distribution of port identifiers for rule processing |
US11611613B2 (en) | 2020-07-24 | 2023-03-21 | Vmware, Inc. | Policy-based forwarding to a load balancer of a load balancing cluster |
US11902050B2 (en) | 2020-07-28 | 2024-02-13 | VMware LLC | Method for providing distributed gateway service at host computer |
US11451413B2 (en) | 2020-07-28 | 2022-09-20 | Vmware, Inc. | Method for advertising availability of distributed gateway service and machines at host computer |
US11570090B2 (en) | 2020-07-29 | 2023-01-31 | Vmware, Inc. | Flow tracing operation in container cluster |
US11558426B2 (en) | 2020-07-29 | 2023-01-17 | Vmware, Inc. | Connection tracking for container cluster |
US11196628B1 (en) | 2020-07-29 | 2021-12-07 | Vmware, Inc. | Monitoring container clusters |
US11803408B2 (en) | 2020-07-29 | 2023-10-31 | Vmware, Inc. | Distributed network plugin agents for container networking |
US11863352B2 (en) | 2020-07-30 | 2024-01-02 | Vmware, Inc. | Hierarchical networking for nested container clusters |
US11539633B2 (en) * | 2020-08-31 | 2022-12-27 | Vmware, Inc. | Determining whether to rate limit traffic |
US11875172B2 (en) | 2020-09-28 | 2024-01-16 | VMware LLC | Bare metal computer for booting copies of VM images on multiple computing devices using a smart NIC |
US11343227B2 (en) | 2020-09-28 | 2022-05-24 | Vmware, Inc. | Application deployment in multi-site virtualization infrastructure |
US11606310B2 (en) | 2020-09-28 | 2023-03-14 | Vmware, Inc. | Flow processing offload using virtual port identifiers |
US11474880B2 (en) * | 2020-10-19 | 2022-10-18 | Pensando Systems Inc. | Network state synchronization for workload migrations in edge devices |
US11637737B2 (en) * | 2020-10-23 | 2023-04-25 | Dell Products L.P. | Network data management framework |
US11611625B2 (en) | 2020-12-15 | 2023-03-21 | Vmware, Inc. | Providing stateful services in a scalable manner for machines executing on host computers |
US11734043B2 (en) | 2020-12-15 | 2023-08-22 | Vmware, Inc. | Providing stateful services in a scalable manner for machines executing on host computers |
US11909721B2 (en) | 2020-12-29 | 2024-02-20 | Mastercard International Incorporated | Systems and methods for automated firewall provisioning for virtual machines |
US11736436B2 (en) | 2020-12-31 | 2023-08-22 | Vmware, Inc. | Identifying routes with indirect addressing in a datacenter |
US11336533B1 (en) | 2021-01-08 | 2022-05-17 | Vmware, Inc. | Network visualization of correlations between logical elements and associated physical elements |
US20220286914A1 (en) | 2021-03-05 | 2022-09-08 | Vmware, Inc. | Ric sdk |
US11836551B2 (en) | 2021-03-05 | 2023-12-05 | Vmware, Inc. | Active and standby RICs |
US11700179B2 (en) | 2021-03-26 | 2023-07-11 | Vmware, Inc. | Configuration of logical networking entities |
US11799784B2 (en) | 2021-06-08 | 2023-10-24 | Vmware, Inc. | Virtualized QoS support in software defined networks |
US11606254B2 (en) | 2021-06-11 | 2023-03-14 | Vmware, Inc. | Automatic configuring of VLAN and overlay logical switches for container secondary interfaces |
US11687210B2 (en) | 2021-07-05 | 2023-06-27 | Vmware, Inc. | Criteria-based expansion of group nodes in a network topology visualization |
US11477270B1 (en) * | 2021-07-06 | 2022-10-18 | Vmware, Inc. | Seamless hand-off of data traffic in public cloud environments |
US11711278B2 (en) | 2021-07-24 | 2023-07-25 | Vmware, Inc. | Visualization of flow trace operation across multiple sites |
CN113965347B (zh) * | 2021-09-09 | 2024-03-15 | 山石网科通信技术股份有限公司 | 防火墙的数据处理方法及装置 |
US11855862B2 (en) | 2021-09-17 | 2023-12-26 | Vmware, Inc. | Tagging packets for monitoring and analysis |
CN113612807B (zh) * | 2021-10-09 | 2021-12-03 | 苏州浪潮智能科技有限公司 | 一种分布式防火墙定义方法及*** |
US11936621B2 (en) * | 2021-11-19 | 2024-03-19 | The Bank Of New York Mellon | Firewall drift monitoring and detection |
US11995024B2 (en) | 2021-12-22 | 2024-05-28 | VMware LLC | State sharing between smart NICs |
US11973644B2 (en) * | 2021-12-30 | 2024-04-30 | King Fahd University Of Petroleum And Minerals | Distributed software-defined networking (SDN) control plane framework |
US11799761B2 (en) | 2022-01-07 | 2023-10-24 | Vmware, Inc. | Scaling edge services with minimal disruption |
US11902245B2 (en) | 2022-01-14 | 2024-02-13 | VMware LLC | Per-namespace IP address management method for container networks |
US11962564B2 (en) | 2022-02-15 | 2024-04-16 | VMware LLC | Anycast address for network address translation at edge |
CN114629790B (zh) * | 2022-03-11 | 2023-06-06 | 苏州浪潮智能科技有限公司 | 一种服务器网络集群配置方法及*** |
US11899594B2 (en) | 2022-06-21 | 2024-02-13 | VMware LLC | Maintenance of data message classification cache on smart NIC |
US11928062B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Accelerating data message classification with smart NICs |
US11928367B2 (en) | 2022-06-21 | 2024-03-12 | VMware LLC | Logical memory addressing for network devices |
WO2024037924A1 (fr) * | 2022-08-18 | 2024-02-22 | Signify Holding B.V. | Procédé de migration de nœuds dans un réseau distribué vers un réseau centralisé |
US11848910B1 (en) | 2022-11-11 | 2023-12-19 | Vmware, Inc. | Assigning stateful pods fixed IP addresses depending on unique pod identity |
US11870695B1 (en) * | 2022-12-16 | 2024-01-09 | Microsoft Technology Licensing, Llc | Virtual machine migration on hypervisor network |
US11838176B1 (en) | 2022-12-19 | 2023-12-05 | Vmware, Inc. | Provisioning and deploying RAN applications in a RAN system |
US11831511B1 (en) | 2023-01-17 | 2023-11-28 | Vmware, Inc. | Enforcing network policies in heterogeneous systems |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030093481A1 (en) * | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
US20050060365A1 (en) * | 2002-01-24 | 2005-03-17 | Robinson Scott L. | Context-based information processing |
US20080005293A1 (en) * | 2006-06-30 | 2008-01-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Router and method for server load balancing |
US20080002579A1 (en) * | 2004-12-21 | 2008-01-03 | Fredrik Lindholm | Arrangement and a Method Relating to Flow of Packets in Communication Systems |
US20090129271A1 (en) * | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20090161547A1 (en) * | 2007-12-20 | 2009-06-25 | Packeteer, Inc. | Compression Mechanisms for Control Plane-Data Plane Processing Architectures |
Family Cites Families (304)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69132279T2 (de) | 1990-09-17 | 2001-01-18 | Cabletron Systems Inc | Verfahren zur Isolierung eines Netzwerkfehlers |
JPH06250869A (ja) | 1993-03-01 | 1994-09-09 | Hitachi Ltd | 分散制御システム |
JPH0779233A (ja) | 1993-06-29 | 1995-03-20 | Synoptics Commun Inc | トポロジを確定する装置及びトポロジ情報を通信する方法及び装置 |
US5473771A (en) | 1993-09-01 | 1995-12-05 | At&T Corp. | Fault-tolerant processing system architecture |
SE9402059D0 (sv) | 1994-06-13 | 1994-06-13 | Ellemtel Utvecklings Ab | Sätt och anordning vid telekommunikation |
US5751967A (en) | 1994-07-25 | 1998-05-12 | Bay Networks Group, Inc. | Method and apparatus for automatically configuring a network device to support a virtual network |
US5550816A (en) | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5586121A (en) | 1995-04-21 | 1996-12-17 | Hybrid Networks, Inc. | Asymmetric hybrid access system and method |
US6035105A (en) | 1996-01-02 | 2000-03-07 | Cisco Technology, Inc. | Multiple VLAN architecture system |
US5898830A (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US6108304A (en) | 1996-03-08 | 2000-08-22 | Abe; Hajime | Packet switching network, packet switching equipment, and network management equipment |
JP2001514833A (ja) | 1997-03-12 | 2001-09-11 | ノマディックス・リミテッド・ライアビリティ・カンパニー | ノーマッド変換器またはルータ |
US6295299B1 (en) | 1997-08-29 | 2001-09-25 | Extreme Networks, Inc. | Data path architecture for a LAN switch |
US6128279A (en) | 1997-10-06 | 2000-10-03 | Web Balance, Inc. | System for balancing loads among network servers |
US6092121A (en) | 1997-12-18 | 2000-07-18 | International Business Machines Corporation | Method and apparatus for electronically integrating data captured in heterogeneous information systems |
US7055173B1 (en) | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
US6353614B1 (en) | 1998-03-05 | 2002-03-05 | 3Com Corporation | Method and protocol for distributed network address translation |
JP3609256B2 (ja) | 1998-05-19 | 2005-01-12 | 株式会社日立製作所 | ネットワーク管理装置,ノード装置及びネットワーク管理システム |
US6424659B2 (en) | 1998-07-17 | 2002-07-23 | Network Equipment Technologies, Inc. | Multi-layer switching apparatus and method |
US7055027B1 (en) | 1999-03-22 | 2006-05-30 | Microsoft Corporation | System and method for trusted inspection of a data stream |
JP2000332817A (ja) | 1999-05-18 | 2000-11-30 | Fujitsu Ltd | パケット処理装置 |
US6573369B2 (en) * | 1999-05-21 | 2003-06-03 | Bioforce Nanosciences, Inc. | Method and apparatus for solid state molecular analysis |
US6970913B1 (en) | 1999-07-02 | 2005-11-29 | Cisco Technology, Inc. | Load balancing using distributed forwarding agents with application based feedback for different virtual machines |
US6678274B1 (en) | 1999-07-30 | 2004-01-13 | Riverstone Networks, Inc. | Method and system for managing forwarding tables |
US6505192B1 (en) | 1999-08-12 | 2003-01-07 | International Business Machines Corporation | Security rule processing for connectionless protocols |
US7020697B1 (en) | 1999-10-01 | 2006-03-28 | Accenture Llp | Architectures for netcentric computing systems |
US6963585B1 (en) | 1999-10-21 | 2005-11-08 | International Business Machines Corporation | Method and system for establishing a virtual path capability in a frame relay network |
US6680934B1 (en) | 1999-12-02 | 2004-01-20 | Nortel Networks Limited | System, device and method for expediting control flow in a communication system |
US6880089B1 (en) * | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US9444785B2 (en) * | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US20020093952A1 (en) | 2000-06-30 | 2002-07-18 | Gonda Rumi Sheryar | Method for managing circuits in a multistage cross connect |
US7725602B2 (en) | 2000-07-19 | 2010-05-25 | Akamai Technologies, Inc. | Domain name resolution using a distributed DNS network |
US7389358B1 (en) | 2000-09-13 | 2008-06-17 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US6973023B1 (en) | 2000-12-30 | 2005-12-06 | Cisco Technology, Inc. | Method for routing information over a network employing centralized control |
US6785843B1 (en) | 2001-02-23 | 2004-08-31 | Mcrae Andrew | Data plane restart without state change in a control plane of an intermediate network node |
US7209439B2 (en) | 2001-03-20 | 2007-04-24 | Mci, Llc | Pool-based resource management in a data network |
US7069337B2 (en) | 2001-03-20 | 2006-06-27 | Mci, Inc. | Policy-based synchronization of per-class resources between routers in a data network |
US7240106B2 (en) | 2001-04-25 | 2007-07-03 | Hewlett-Packard Development Company, L.P. | System and method for remote discovery and configuration of a network device |
US7343410B2 (en) | 2001-06-28 | 2008-03-11 | Finisar Corporation | Automated creation of application data paths in storage area networks |
US7126944B2 (en) | 2001-07-05 | 2006-10-24 | Intel Corporation | Routing packets across multiple forwarding elements |
US20030009559A1 (en) * | 2001-07-09 | 2003-01-09 | Naoya Ikeda | Network system and method of distributing accesses to a plurality of server apparatus in the network system |
US7765313B2 (en) | 2001-10-09 | 2010-07-27 | Alcatel Lucent | Hierarchical protocol classification engine |
JP3879471B2 (ja) | 2001-10-10 | 2007-02-14 | 株式会社日立製作所 | 計算機資源割当方法 |
US20030079000A1 (en) | 2001-10-19 | 2003-04-24 | Chamberlain Robert L. | Methods and apparatus for configuring multiple logical networks of devices on a single physical network |
US7133365B2 (en) | 2001-11-02 | 2006-11-07 | Internap Network Services Corporation | System and method to provide routing control of information over networks |
JP3879594B2 (ja) | 2001-11-02 | 2007-02-14 | 日本電気株式会社 | スイッチ方法、装置およびプログラム |
US7042912B2 (en) | 2001-12-18 | 2006-05-09 | Nortel Networks Limited | Resynchronization of control and data path state for networks |
US6895429B2 (en) | 2001-12-28 | 2005-05-17 | Network Appliance, Inc. | Technique for enabling multiple virtual filers on a single filer to participate in multiple address spaces with overlapping network addresses |
US6781990B1 (en) | 2002-02-11 | 2004-08-24 | Extreme Networks | Method and system for managing traffic in a packet network environment |
JP3904968B2 (ja) | 2002-04-19 | 2007-04-11 | 日本電信電話株式会社 | Vpnシステムおよびルータ |
US7197572B2 (en) | 2002-05-06 | 2007-03-27 | Qlogic, Corporation | System and method for implementing logical switches in a network system |
US20030223379A1 (en) | 2002-05-28 | 2003-12-04 | Xuguang Yang | Method and system for inter-domain loop protection using a hierarchy of loop resolving protocols |
US7340535B1 (en) | 2002-06-04 | 2008-03-04 | Fortinet, Inc. | System and method for controlling routing in a virtual router system |
US7925661B2 (en) | 2002-06-27 | 2011-04-12 | International Business Machines Corporation | Method and system for information processing using meta-archives |
US7206861B1 (en) | 2002-07-29 | 2007-04-17 | Juniper Networks, Inc. | Network traffic distribution across parallel paths |
FR2844415B1 (fr) | 2002-09-05 | 2005-02-11 | At & T Corp | Systeme pare-feu pour interconnecter deux reseaux ip geres par deux entites administratives differentes |
US20040054793A1 (en) | 2002-09-16 | 2004-03-18 | Richard Coleman | System and method for high performance shared web hosting |
US20040131059A1 (en) | 2002-09-19 | 2004-07-08 | Ram Ayyakad | Single-pass packet scan |
US20040073659A1 (en) | 2002-10-15 | 2004-04-15 | Carl Rajsic | Method and apparatus for managing nodes in a network |
US7606229B1 (en) | 2002-11-08 | 2009-10-20 | Cisco Technology, Inc. | Generic bridge packet tunneling |
US20040098505A1 (en) | 2002-11-20 | 2004-05-20 | Clemmensen Daniel G. | Forwarding system with multiple logical sub-system functionality |
US7283465B2 (en) | 2003-01-07 | 2007-10-16 | Corrigent Systems Ltd. | Hierarchical virtual private LAN service protection scheme |
US20050021683A1 (en) | 2003-03-27 | 2005-01-27 | Chris Newton | Method and apparatus for correlating network activity through visualizing network data |
JP4157409B2 (ja) | 2003-03-31 | 2008-10-01 | 富士通株式会社 | 仮想パス構築装置および仮想パス構築方法 |
US20040199587A1 (en) * | 2003-04-01 | 2004-10-07 | Mcknight Russell F. | Company-only electronic mail |
US7283473B2 (en) | 2003-04-10 | 2007-10-16 | International Business Machines Corporation | Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network |
US8473620B2 (en) | 2003-04-14 | 2013-06-25 | Riverbed Technology, Inc. | Interception of a cloud-based communication connection |
US7792987B1 (en) | 2003-04-21 | 2010-09-07 | Juniper Networks, Inc. | Supporting virtual private networks using a first network topology for forwarding and a subset of the first network topology or a smaller topology for signaling |
US7710874B2 (en) | 2003-06-04 | 2010-05-04 | International Business Machines Corporation | System and method for automatic management of many computer data processing system pipes |
US20050022017A1 (en) | 2003-06-24 | 2005-01-27 | Maufer Thomas A. | Data structures and state tracking for network protocol processing |
US7774597B2 (en) * | 2003-06-27 | 2010-08-10 | Ram Gopal Lakshmi Narayanan | System and method for nodes communicating in a shared network segment |
US7453852B2 (en) | 2003-07-14 | 2008-11-18 | Lucent Technologies Inc. | Method and system for mobility across heterogeneous address spaces |
US20050018669A1 (en) | 2003-07-25 | 2005-01-27 | International Business Machines Corporation | Infiniband subnet management queue pair emulation for multiple logical ports on a single physical port |
US7697527B2 (en) | 2003-07-30 | 2010-04-13 | Nortel Networks Limited | Method and apparatus for direct frame switching using frame contained destination information |
US7363528B2 (en) | 2003-08-25 | 2008-04-22 | Lucent Technologies Inc. | Brink of failure and breach of security detection and recovery system |
US7342916B2 (en) | 2003-09-10 | 2008-03-11 | Intel Corporation | Method, apparatus and system for optimizing routing of mobile IP packets |
US8009556B2 (en) | 2003-10-17 | 2011-08-30 | Ip Infusion, Inc. | System and method for providing redundant routing capabilities for a network node |
US7246174B2 (en) * | 2003-10-28 | 2007-07-17 | Nacon Consulting, Llc | Method and system for accessing and managing virtual machines |
US7555002B2 (en) | 2003-11-06 | 2009-06-30 | International Business Machines Corporation | Infiniband general services queue pair virtualization for multiple logical ports on a single physical port |
US7447775B1 (en) | 2003-11-07 | 2008-11-04 | Cisco Technology, Inc. | Methods and apparatus for supporting transmission of streaming data |
US8572249B2 (en) * | 2003-12-10 | 2013-10-29 | Aventail Llc | Network appliance for balancing load and platform services |
US7450598B2 (en) | 2003-12-15 | 2008-11-11 | At&T Intellectual Property I, L.P. | System and method to provision MPLS/VPN network |
US7478173B1 (en) | 2003-12-18 | 2009-01-13 | Wmware, Inc. | Method and system for sharing a network connection in a virtual computer system |
ES2388667T3 (es) * | 2003-12-22 | 2012-10-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Control de caudales de paquetes de comunicaciones móviles |
US7706325B2 (en) | 2003-12-30 | 2010-04-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for handling context of data packet flows |
US7627692B2 (en) | 2004-01-30 | 2009-12-01 | Nokia Corporation | Multiplexing of compressed control and user-plane messages |
JP3972338B2 (ja) | 2004-03-09 | 2007-09-05 | 株式会社シンクチューブ | 移動通信装置及び移動通信プログラム |
US7742398B1 (en) | 2004-04-12 | 2010-06-22 | Azul Systems, Inc. | Information redirection |
US7664818B2 (en) * | 2004-04-21 | 2010-02-16 | Sap (Ag) | Message-oriented middleware provider having multiple server instances integrated into a clustered application server infrastructure |
EP1745631A1 (fr) | 2004-05-12 | 2007-01-24 | Alcatel | Blocage automatique d'intrus de reseau |
US7761259B1 (en) | 2004-05-26 | 2010-07-20 | William Brian Seymour | Methods and systems for testing evaluation modules |
JP4403396B2 (ja) * | 2004-07-13 | 2010-01-27 | ソニー株式会社 | 撮像装置及び撮像素子の集積回路 |
ATE387050T1 (de) | 2004-08-02 | 2008-03-15 | Alcatel Lucent | Gemeinsam genutzte ressourcen in einer multimanager-umgebung |
US20060059551A1 (en) * | 2004-09-13 | 2006-03-16 | Utstarcom Inc. | Dynamic firewall capabilities for wireless access gateways |
GB2419701A (en) | 2004-10-29 | 2006-05-03 | Hewlett Packard Development Co | Virtual overlay infrastructure with dynamic control of mapping |
GB2419703A (en) | 2004-10-29 | 2006-05-03 | Hewlett Packard Development Co | Isolated virtual overlay infrastructures each having an interface to control interaction with others |
US8068408B2 (en) | 2004-11-01 | 2011-11-29 | Alcatel Lucent | Softrouter protocol disaggregation |
US9014181B2 (en) | 2004-11-01 | 2015-04-21 | Alcatel Lucent | Softrouter separate control network |
US20080049621A1 (en) | 2004-12-31 | 2008-02-28 | Mcguire Alan | Connection-Oriented Communications Scheme For Connection-Less Communications Traffic |
US7730486B2 (en) | 2005-02-28 | 2010-06-01 | Hewlett-Packard Development Company, L.P. | System and method for migrating virtual machines on cluster systems |
US7646775B2 (en) | 2005-03-08 | 2010-01-12 | Leaf Networks, Llc | Protocol and system for firewall and NAT traversal for TCP connections |
US7936770B1 (en) | 2005-03-08 | 2011-05-03 | Enterasys Networks, Inc. | Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces |
FR2883437B1 (fr) | 2005-03-16 | 2007-08-03 | Wavestorm Sarl | Dispositif et procede de communication dans un reseau |
US7697536B2 (en) | 2005-04-01 | 2010-04-13 | International Business Machines Corporation | Network communications for operating system partitions |
US7192306B2 (en) * | 2005-07-06 | 2007-03-20 | Ultra Volt, Inc. | High voltage connector |
US7802000B1 (en) | 2005-08-01 | 2010-09-21 | Vmware | Virtual network in server farm |
US7855950B2 (en) | 2005-08-01 | 2010-12-21 | Cisco Technology, Inc. | Congruent forwarding paths for unicast and multicast traffic |
US8149737B2 (en) | 2005-08-09 | 2012-04-03 | Motorola Solutions, Inc. | Method and system for data transmission in a wireless network |
US8645964B2 (en) | 2005-08-23 | 2014-02-04 | Mellanox Technologies Ltd. | System and method for accelerating input/output access operation on a virtual machine |
US20070101323A1 (en) | 2005-10-28 | 2007-05-03 | Microsoft Corporation | Automatic virtual machine adjustments to network changes |
JP2007135109A (ja) | 2005-11-11 | 2007-05-31 | Hitachi Ltd | 仮想ネットワーク管理方法、仮想ネットワーク管理プログラム、仮想ネットワーク管理システムおよび仮想ネットワーク管理手段 |
US7945658B1 (en) | 2005-12-05 | 2011-05-17 | Narus, Inc. | Method for real-time visualization of BGP analysis and trouble-shooting |
US7710872B2 (en) | 2005-12-14 | 2010-05-04 | Cisco Technology, Inc. | Technique for enabling traffic engineering on CE-CE paths across a provider network |
US7647426B2 (en) | 2006-01-12 | 2010-01-12 | Cisco Technology, Inc. | Method and apparatus for achieving Border Gateway Protocol convergence using alternate route information |
US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US8533808B2 (en) * | 2006-02-02 | 2013-09-10 | Check Point Software Technologies Ltd. | Network security smart load balancing using a multiple processor device |
US20070266433A1 (en) | 2006-03-03 | 2007-11-15 | Hezi Moore | System and Method for Securing Information in a Virtual Computing Environment |
US7840398B2 (en) * | 2006-03-28 | 2010-11-23 | Intel Corporation | Techniques for unified management communication for virtualization systems |
JP4519098B2 (ja) | 2006-03-30 | 2010-08-04 | 株式会社日立製作所 | 計算機の管理方法、計算機システム、及び管理プログラム |
US7801128B2 (en) | 2006-03-31 | 2010-09-21 | Amazon Technologies, Inc. | Managing communications between computing nodes |
US8838756B2 (en) | 2009-07-27 | 2014-09-16 | Vmware, Inc. | Management and implementation of enclosed local networks in a virtual lab |
US7839847B2 (en) | 2006-05-08 | 2010-11-23 | Cisco Technology, Inc. | Methods and apparatus providing VPN traffic matrix construction |
CA2547047A1 (fr) | 2006-05-15 | 2007-11-15 | Embotics Corporation | Gestion de machines virtuelles faisant appel a des elements autonomes mobiles |
US8060875B1 (en) | 2006-05-26 | 2011-11-15 | Vmware, Inc. | System and method for multiple virtual teams |
JP4714081B2 (ja) | 2006-06-01 | 2011-06-29 | アラクサラネットワークス株式会社 | ネットワーク接続装置 |
US8543808B2 (en) | 2006-08-24 | 2013-09-24 | Microsoft Corporation | Trusted intermediary for network data processing |
US8204982B2 (en) | 2006-09-14 | 2012-06-19 | Quova, Inc. | System and method of middlebox detection and characterization |
JP2008107176A (ja) * | 2006-10-25 | 2008-05-08 | Hitachi High-Technologies Corp | 分離カラム及びそれを用いた液体クロマトグラフ |
US8185893B2 (en) * | 2006-10-27 | 2012-05-22 | Hewlett-Packard Development Company, L.P. | Starting up at least one virtual machine in a physical machine by a load balancer |
US7826482B1 (en) | 2006-11-17 | 2010-11-02 | Juniper Networks, Inc. | Service-specific forwarding in an LDP-RSVP hybrid network |
JP4786747B2 (ja) * | 2006-12-12 | 2011-10-05 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | ミドルボックスにおけるipアドレス分散 |
US20090070877A1 (en) * | 2006-12-18 | 2009-03-12 | Carol Davids | Method for securing streaming multimedia network transmissions |
US7738457B2 (en) | 2006-12-20 | 2010-06-15 | Oracle America, Inc. | Method and system for virtual routing using containers |
US8381209B2 (en) | 2007-01-03 | 2013-02-19 | International Business Machines Corporation | Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls |
US7793148B2 (en) | 2007-01-12 | 2010-09-07 | International Business Machines Corporation | Using virtual copies in a failover and failback environment |
US7856549B2 (en) | 2007-01-24 | 2010-12-21 | Hewlett-Packard Development Company, L.P. | Regulating power consumption |
US20080189769A1 (en) | 2007-02-01 | 2008-08-07 | Martin Casado | Secure network switching infrastructure |
US20080186990A1 (en) | 2007-02-02 | 2008-08-07 | International Business Machines Corporation | Translation module, method and computer program product for providing multiple infiniband address support for vm migration using infiniband address translation |
US8320388B2 (en) | 2007-02-02 | 2012-11-27 | Groupe Des Ecoles Des Telecommunications (Get) | Autonomic network node system |
US8910275B2 (en) | 2007-02-14 | 2014-12-09 | Hewlett-Packard Development Company, L.P. | Network monitoring |
US7796594B2 (en) | 2007-02-14 | 2010-09-14 | Marvell Semiconductor, Inc. | Logical bridging system and method |
US7925850B1 (en) | 2007-02-16 | 2011-04-12 | Vmware, Inc. | Page signature disambiguation for increasing the efficiency of virtual machine migration in shared-page virtualized computer systems |
US9661112B2 (en) | 2007-02-22 | 2017-05-23 | International Business Machines Corporation | System and methods for providing server virtualization assistance |
US7706266B2 (en) * | 2007-03-12 | 2010-04-27 | Citrix Systems, Inc. | Systems and methods of providing proxy-based quality of service |
US7936677B2 (en) * | 2007-03-22 | 2011-05-03 | Sharp Laboratories Of America, Inc. | Selection of an audio visual stream by sampling |
US8055789B2 (en) | 2007-03-27 | 2011-11-08 | Amazon Technologies, Inc. | Configuring intercommunications between computing nodes |
US7941837B1 (en) * | 2007-04-18 | 2011-05-10 | Juniper Networks, Inc. | Layer two firewall with active-active high availability support |
US7903655B2 (en) | 2007-04-19 | 2011-03-08 | Hewlett-Packard Development Company, L.P. | Marked packet forwarding |
EP2153340A4 (fr) | 2007-05-08 | 2015-10-21 | Riverbed Technology Inc | Serveur de fichiers orienté segment hybride, et accélérateur wan |
US8014409B1 (en) | 2007-05-30 | 2011-09-06 | Foundry Networks, Llc | Virtual router identifier that spans multiple interfaces in a routing device |
US8402529B1 (en) | 2007-05-30 | 2013-03-19 | M86 Security, Inc. | Preventing propagation of malicious software during execution in a virtual machine |
US8132248B2 (en) | 2007-07-18 | 2012-03-06 | Trend Micro Incorporated | Managing configurations of a firewall |
US8031633B2 (en) | 2007-08-13 | 2011-10-04 | Honeywell International Inc. | Virtual network architecture for space data processing |
US8671256B2 (en) | 2007-08-27 | 2014-03-11 | International Business Machines Corporation | Migrating contents of a memory on a virtual machine |
US8528070B2 (en) * | 2007-09-05 | 2013-09-03 | Hewlett-Packard Development Company, L.P. | System and method for secure service delivery |
US8798056B2 (en) | 2007-09-24 | 2014-08-05 | Intel Corporation | Method and system for virtual port communications |
JP5427181B2 (ja) | 2007-10-03 | 2014-02-26 | ヴァーテラ テクノロジー サーヴィシズ インコーポレイテッド | 仮想化アプリケーション加速化インフラストラクチャ |
US8848544B2 (en) | 2007-11-08 | 2014-09-30 | Cisco Technology, Inc. | Event correlation using network data flow simulation over unmanaged network segments |
US7984123B2 (en) * | 2007-12-10 | 2011-07-19 | Oracle America, Inc. | Method and system for reconfiguring a virtual network path |
US8199750B1 (en) | 2007-12-18 | 2012-06-12 | World Wide Packets, Inc. | Communicating with a control plane using a forwarding information format and control plane processing of packets devoid of a virtual switch identifier |
EP2220851A4 (fr) * | 2007-12-19 | 2013-07-31 | Ericsson Telefon Ab L M | Procédé pour faciliter des connexions ip à des hôtes derrière des boîtiers intermédiaires |
US8194674B1 (en) | 2007-12-20 | 2012-06-05 | Quest Software, Inc. | System and method for aggregating communications and for translating between overlapping internal network addresses and unique external network addresses |
US9432213B2 (en) | 2007-12-31 | 2016-08-30 | Rpx Clearinghouse Llc | IP forwarding across a link state protocol controlled ethernet network |
US7826390B2 (en) | 2008-01-15 | 2010-11-02 | At&T Intellectual Property I, L.P. | Method and apparatus for providing a distributed subscriber load distribution |
GB2459433B (en) * | 2008-03-07 | 2012-06-06 | Hewlett Packard Development Co | Distributed network connection policy management |
US8155028B2 (en) | 2008-03-17 | 2012-04-10 | Alcatel Lucent | Method and apparatus for providing full logical connectivity in MPLS networks |
JP5125659B2 (ja) | 2008-03-24 | 2013-01-23 | 富士通株式会社 | 情報処理装置、情報処理方法及びコンピュータプログラム |
US8336094B2 (en) | 2008-03-27 | 2012-12-18 | Juniper Networks, Inc. | Hierarchical firewalls |
US8429739B2 (en) | 2008-03-31 | 2013-04-23 | Amazon Technologies, Inc. | Authorizing communications between computing nodes |
US8473594B2 (en) | 2008-05-02 | 2013-06-25 | Skytap | Multitenant hosted virtual machine infrastructure |
US8339959B1 (en) | 2008-05-20 | 2012-12-25 | Juniper Networks, Inc. | Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane |
US8195774B2 (en) | 2008-05-23 | 2012-06-05 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US8849971B2 (en) | 2008-05-28 | 2014-09-30 | Red Hat, Inc. | Load balancing in cloud-based networks |
US8996683B2 (en) | 2008-06-09 | 2015-03-31 | Microsoft Technology Licensing, Llc | Data center without structural bottlenecks |
US8160063B2 (en) | 2008-06-09 | 2012-04-17 | Microsoft Corporation | Data center interconnect and traffic engineering |
US8031606B2 (en) | 2008-06-24 | 2011-10-04 | Intel Corporation | Packet switching |
US8108467B2 (en) | 2008-06-26 | 2012-01-31 | International Business Machines Corporation | Load balanced data processing performed on an application message transmitted between compute nodes of a parallel computer |
US8099615B2 (en) | 2008-06-30 | 2012-01-17 | Oracle America, Inc. | Method and system for power management in a virtual machine environment without disrupting network connectivity |
US8027260B2 (en) | 2008-07-23 | 2011-09-27 | Verizon Patent And Licensing Inc. | Mixed integer programming model for minimizing leased access network costs |
US8005015B2 (en) * | 2008-07-28 | 2011-08-23 | Telefonaktiebolaget L M Ericsson (Publ) | Signaling framework for negotiating and executing composition of registries |
US20100036903A1 (en) * | 2008-08-11 | 2010-02-11 | Microsoft Corporation | Distributed load balancer |
US8064362B2 (en) * | 2008-08-21 | 2011-11-22 | Cisco Technology, Inc. | Wide area network optimization proxy routing protocol |
US8018866B1 (en) * | 2008-08-26 | 2011-09-13 | Juniper Networks, Inc. | Adaptively applying network acceleration services with an intermediate network device |
US8265071B2 (en) | 2008-09-11 | 2012-09-11 | Juniper Networks, Inc. | Methods and apparatus related to a flexible data center security architecture |
US7808929B2 (en) | 2008-09-30 | 2010-10-05 | Oracle America, Inc. | Efficient ACL lookup algorithms |
US7885276B1 (en) | 2008-09-30 | 2011-02-08 | Emc Corporation | Isolating network traffic in multi-tenant virtualization environments |
US7873060B2 (en) * | 2008-10-18 | 2011-01-18 | Fortinet, Inc. | Accelerating data communication using tunnels |
JP2010114665A (ja) | 2008-11-06 | 2010-05-20 | Toshiba Corp | 通信データ制御方法及び計算機システム |
US7921197B2 (en) | 2008-11-19 | 2011-04-05 | Vmware, Inc. | Dynamic configuration of virtual machines |
US7962647B2 (en) | 2008-11-24 | 2011-06-14 | Vmware, Inc. | Application delivery control module for virtual network switch |
US8171124B2 (en) * | 2008-11-25 | 2012-05-01 | Citrix Systems, Inc. | Systems and methods for GSLB remote service monitoring |
US8493871B2 (en) * | 2008-11-26 | 2013-07-23 | Riverbed Technology, Inc. | End-to end analysis of transactions in networks with traffic-altering devices |
US8868675B2 (en) * | 2008-12-04 | 2014-10-21 | Cisco Technology, Inc. | Network optimization using distributed virtual resources |
US8055770B2 (en) | 2008-12-15 | 2011-11-08 | At&T Intellectual Property I, L.P. | Method and apparatus for providing network virtualization |
US20100162036A1 (en) | 2008-12-19 | 2010-06-24 | Watchguard Technologies, Inc. | Self-Monitoring Cluster of Network Security Devices |
US8255496B2 (en) | 2008-12-30 | 2012-08-28 | Juniper Networks, Inc. | Method and apparatus for determining a network topology during network provisioning |
US8054832B1 (en) | 2008-12-30 | 2011-11-08 | Juniper Networks, Inc. | Methods and apparatus for routing between virtual resources based on a routing location policy |
US8331362B2 (en) | 2008-12-30 | 2012-12-11 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
US8565118B2 (en) | 2008-12-30 | 2013-10-22 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
US7995483B1 (en) | 2009-01-20 | 2011-08-09 | Juniper Networks, Inc. | Simultaneously testing connectivity to multiple remote maintenance endpoints of the same maintenance association |
EP2219045B1 (fr) * | 2009-01-28 | 2012-03-14 | Siemens Aktiengesellschaft | Module haute fréquence de radar |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
JP5561173B2 (ja) | 2009-02-03 | 2014-07-30 | 日本電気株式会社 | アプリケーションスイッチシステム、及びアプリケーションスイッチ方法 |
US8213336B2 (en) | 2009-02-23 | 2012-07-03 | Cisco Technology, Inc. | Distributed data center access switch |
JP5544097B2 (ja) | 2009-02-23 | 2014-07-09 | 株式会社日立国際電気 | ネットワーク間接続装置 |
CN102349268B (zh) | 2009-03-09 | 2015-11-25 | 日本电气株式会社 | OpenFlow通信***和OpenFlow通信方法 |
US8265075B2 (en) | 2009-03-16 | 2012-09-11 | International Business Machines Corporation | Method and apparatus for managing, configuring, and controlling an I/O virtualization device through a network switch |
CN102369703B (zh) | 2009-03-30 | 2014-10-29 | 日本电气株式会社 | 通信流控制***、通信流控制方法和通信流处理程序 |
WO2010115060A2 (fr) | 2009-04-01 | 2010-10-07 | Nicira Networks | Procédé et appareil destinés à mettre en application et à gérer des commutateurs virtuels |
US20100254385A1 (en) | 2009-04-07 | 2010-10-07 | Cisco Technology, Inc. | Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network |
US8589919B2 (en) | 2009-04-28 | 2013-11-19 | Cisco Technology, Inc. | Traffic forwarding for virtual machines |
US8027354B1 (en) | 2009-04-29 | 2011-09-27 | Cisco Technology, Inc. | Network consolidation for virtualized servers |
US8429647B2 (en) | 2009-05-06 | 2013-04-23 | Vmware, Inc. | Virtual machine migration across network by publishing routes to the associated virtual networks via virtual router after the start of migration of the virtual machine |
US9497039B2 (en) | 2009-05-28 | 2016-11-15 | Microsoft Technology Licensing, Llc | Agile data center network architecture |
US9210065B2 (en) | 2009-06-22 | 2015-12-08 | Alcatel Lucent | Providing cloud-based services using dynamic network virtualization |
US9621516B2 (en) * | 2009-06-24 | 2017-04-11 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US8644188B1 (en) | 2009-06-25 | 2014-02-04 | Amazon Technologies, Inc. | Providing virtual networking functionality for managed computer networks |
US8634437B2 (en) | 2009-07-01 | 2014-01-21 | Riverbed Technology, Inc. | Extended network protocols for communicating metadata with virtual machines |
US8990433B2 (en) | 2009-07-01 | 2015-03-24 | Riverbed Technology, Inc. | Defining network traffic processing flows between virtual machines |
US8572609B2 (en) | 2009-07-01 | 2013-10-29 | Riverbed Technology, Inc. | Configuring bypass functionality of a network device based on the state of one or more hosted virtual machines |
US8954957B2 (en) | 2009-07-01 | 2015-02-10 | Riverbed Technology, Inc. | Network traffic processing according to network traffic rule criteria and transferring network traffic metadata in a network device that includes hosted virtual machines |
US8650618B2 (en) | 2009-07-22 | 2014-02-11 | Cisco Technology, Inc. | Integrating service insertion architecture and virtual private network |
US9270542B2 (en) | 2009-07-31 | 2016-02-23 | Ixia | Apparatus and methods for forwarding data packets captured from a network |
US8339994B2 (en) | 2009-08-27 | 2012-12-25 | Brocade Communications Systems, Inc. | Defining an optimal topology for a group of logical switches |
US8619779B2 (en) | 2009-09-30 | 2013-12-31 | Alcatel Lucent | Scalable architecture for enterprise extension in a cloud topology |
US8571031B2 (en) | 2009-10-07 | 2013-10-29 | Intel Corporation | Configurable frame processing pipeline in a packet switch |
US8599864B2 (en) | 2009-10-08 | 2013-12-03 | Brocade Communications Systems, Inc. | Transit switches in a network of logical switches |
US20110085557A1 (en) | 2009-10-08 | 2011-04-14 | Brocade Communications Systems, Inc. | Partitioning of Switches and Fabrics into Logical Switches and Fabrics |
US8693485B2 (en) | 2009-10-14 | 2014-04-08 | Dell Products, Lp | Virtualization aware network switch |
EP2497234B1 (fr) | 2009-11-02 | 2018-09-19 | Marvell World Trade Ltd. | Dispositif de réseau et procédé basés sur des interfaces virtuelles |
US9531674B2 (en) | 2009-11-11 | 2016-12-27 | Microsoft Technology Licensing, Llc | Virtual host security profiles |
US9203747B1 (en) * | 2009-12-07 | 2015-12-01 | Amazon Technologies, Inc. | Providing virtual networking device functionality for managed computer networks |
US7937438B1 (en) | 2009-12-07 | 2011-05-03 | Amazon Technologies, Inc. | Using virtual networking devices to manage external connections |
US7991859B1 (en) | 2009-12-28 | 2011-08-02 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US8224971B1 (en) | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US7953865B1 (en) | 2009-12-28 | 2011-05-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8887266B2 (en) | 2010-01-08 | 2014-11-11 | Board Of Trustees Of Michigan State University | Method for computing network reachability |
US8650299B1 (en) | 2010-02-03 | 2014-02-11 | Citrix Systems, Inc. | Scalable cloud computing |
US8751738B2 (en) | 2010-02-08 | 2014-06-10 | Microsoft Corporation | Background migration of virtual storage |
US20110206132A1 (en) | 2010-02-19 | 2011-08-25 | Lazar Bivolarsky | Data Compression for Video |
US8612627B1 (en) | 2010-03-03 | 2013-12-17 | Amazon Technologies, Inc. | Managing encoded multi-part communications for provided computer networks |
JP5651970B2 (ja) | 2010-03-11 | 2015-01-14 | 日本電気株式会社 | 通信装置、通信制御方法、及び通信制御用プログラム |
US8863144B2 (en) | 2010-03-15 | 2014-10-14 | International Business Machines Corporation | Method and apparatus for determining resources consumed by tasks |
JP5505707B2 (ja) | 2010-03-30 | 2014-05-28 | 日本電気株式会社 | ネットワークシステム及びその運用方法 |
US8224931B1 (en) | 2010-03-31 | 2012-07-17 | Amazon Technologies, Inc. | Managing use of intermediate destination computing nodes for provided computer networks |
US8599854B2 (en) | 2010-04-16 | 2013-12-03 | Cisco Technology, Inc. | Method of identifying destination in a virtual environment |
US8811153B1 (en) | 2010-05-03 | 2014-08-19 | Pluribus Networks Inc. | Switch fabric for network devices |
US8989186B2 (en) | 2010-06-08 | 2015-03-24 | Brocade Communication Systems, Inc. | Virtual port grouping for virtual cluster switching |
US8813209B2 (en) | 2010-06-03 | 2014-08-19 | International Business Machines Corporation | Automating network reconfiguration during migrations |
US8374183B2 (en) | 2010-06-22 | 2013-02-12 | Microsoft Corporation | Distributed virtual network gateways |
WO2012006190A1 (fr) | 2010-06-29 | 2012-01-12 | Huawei Technologies Co., Ltd. | Passerelles et serveur mandataire délégués pour hôtes cibles dans de grands réseaux de couche 2 et résolution d'adresse avec adresses de protocole internet dupliquées |
US8880468B2 (en) * | 2010-07-06 | 2014-11-04 | Nicira, Inc. | Secondary storage architecture for a network control system that utilizes a primary network information base |
US8456984B2 (en) | 2010-07-19 | 2013-06-04 | Ciena Corporation | Virtualized shared protection capacity |
US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
JP5476261B2 (ja) | 2010-09-14 | 2014-04-23 | 株式会社日立製作所 | マルチテナント型情報処理システム、管理サーバ及び構成管理方法 |
US9104458B1 (en) | 2010-09-30 | 2015-08-11 | Amazon Technologies, Inc. | Managing virtual computing nodes using isolation and migration techniques |
CN102457583B (zh) | 2010-10-19 | 2014-09-10 | 中兴通讯股份有限公司 | 一种虚拟机移动性的实现方法及*** |
US8621058B2 (en) | 2010-10-28 | 2013-12-31 | Hewlett-Packard Development Company, L.P. | Providing cloud-based computing services |
US8533285B2 (en) | 2010-12-01 | 2013-09-10 | Cisco Technology, Inc. | Directing data flows in data centers with clustering services |
US8699499B2 (en) * | 2010-12-08 | 2014-04-15 | At&T Intellectual Property I, L.P. | Methods and apparatus to provision cloud computing network elements |
US9329886B2 (en) | 2010-12-10 | 2016-05-03 | Amazon Technologies, Inc. | Virtual machine morphing for heterogeneous migration environments |
US8819678B2 (en) | 2010-12-15 | 2014-08-26 | Red Hat Israel, Ltd. | Live migration of a guest from a source hypervisor to a target hypervisor |
US8755283B2 (en) | 2010-12-17 | 2014-06-17 | Microsoft Corporation | Synchronizing state among load balancer components |
US8468548B2 (en) | 2010-12-17 | 2013-06-18 | Microsoft Corporation | Multi-tenant, high-density container service for hosting stateful and stateless middleware components |
US8615579B1 (en) | 2010-12-28 | 2013-12-24 | Amazon Technologies, Inc. | Managing virtual machine migration |
US8863256B1 (en) | 2011-01-14 | 2014-10-14 | Cisco Technology, Inc. | System and method for enabling secure transactions using flexible identity management in a vehicular environment |
US9264868B2 (en) | 2011-01-19 | 2016-02-16 | Qualcomm Incorporated | Management of network access requests |
US8612744B2 (en) * | 2011-02-10 | 2013-12-17 | Varmour Networks, Inc. | Distributed firewall architecture using virtual machines |
US8776207B2 (en) * | 2011-02-16 | 2014-07-08 | Fortinet, Inc. | Load balancing in a network with session information |
US8665739B2 (en) | 2011-03-16 | 2014-03-04 | Juniper Networks, Inc. | Packet loss measurement at service endpoints of a virtual private LAN service |
US8959569B2 (en) | 2011-03-18 | 2015-02-17 | Juniper Networks, Inc. | Security enforcement in virtualized systems |
US8676980B2 (en) * | 2011-03-22 | 2014-03-18 | Cisco Technology, Inc. | Distributed load balancer in a virtual machine environment |
WO2012133290A1 (fr) | 2011-03-31 | 2012-10-04 | 日本電気株式会社 | Système informatique et procédé de communication |
US8743885B2 (en) | 2011-05-03 | 2014-06-03 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US9043452B2 (en) * | 2011-05-04 | 2015-05-26 | Nicira, Inc. | Network control apparatus and method for port isolation |
US9100298B2 (en) | 2011-05-23 | 2015-08-04 | Cisco Technology, Inc. | Host visibility as a network service |
US8739244B1 (en) | 2011-06-07 | 2014-05-27 | Riverbed Technology, Inc. | Configuring and authenticating WAN optimization devices for accessing content delivery networks |
US8923294B2 (en) * | 2011-06-28 | 2014-12-30 | Polytechnic Institute Of New York University | Dynamically provisioning middleboxes |
US20130019015A1 (en) | 2011-07-12 | 2013-01-17 | International Business Machines Corporation | Application Resource Manager over a Cloud |
US9424144B2 (en) | 2011-07-27 | 2016-08-23 | Microsoft Technology Licensing, Llc | Virtual machine migration to minimize packet loss in virtualized network |
EP2740242B8 (fr) | 2011-08-04 | 2019-01-23 | Mido Holdings Ltd. | Système et procédé d'implémentation et de gestion de réseaux virtuels |
US8813074B2 (en) | 2011-08-05 | 2014-08-19 | Vmware, Inc. | Detecting and correcting network interruptions using network address translation |
US9384030B2 (en) | 2011-08-11 | 2016-07-05 | Ca, Inc. | System and method for deploying a dynamic virtual network address translation appliance |
US9369426B2 (en) | 2011-08-17 | 2016-06-14 | Nicira, Inc. | Distributed logical L3 routing |
US8762501B2 (en) | 2011-08-29 | 2014-06-24 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing a 3G packet core in a cloud computer with openflow data and control planes |
US8856518B2 (en) | 2011-09-07 | 2014-10-07 | Microsoft Corporation | Secure and efficient offloading of network policies to network interface cards |
US9319459B2 (en) | 2011-09-19 | 2016-04-19 | Cisco Technology, Inc. | Services controlled session based flow interceptor |
US20130074181A1 (en) | 2011-09-19 | 2013-03-21 | Cisco Technology, Inc. | Auto Migration of Services Within a Virtual Data Center |
US20130074066A1 (en) | 2011-09-21 | 2013-03-21 | Cisco Technology, Inc. | Portable Port Profiles for Virtual Machines in a Virtualized Data Center |
US9069586B2 (en) * | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US20130103834A1 (en) | 2011-10-21 | 2013-04-25 | Blue Coat Systems, Inc. | Multi-Tenant NATting for Segregating Traffic Through a Cloud Service |
AU2015255293B2 (en) | 2011-11-15 | 2018-03-15 | Nicira, Inc. | Architecture of networks with middleboxes |
EP2748716B1 (fr) | 2011-11-15 | 2018-05-16 | Nicira Inc. | Système de commande de réseau pour configuration de boîtiers intermédiaires |
AU2015258160B2 (en) | 2011-11-15 | 2017-04-20 | Nicira, Inc. | Network control system for configuring middleboxes |
US8830834B2 (en) | 2011-12-21 | 2014-09-09 | Cisco Technology, Inc. | Overlay-based packet steering |
US8711860B2 (en) | 2011-12-22 | 2014-04-29 | Telefonaktiebolaget L M Ericsson (Publ) | Controller for flexible and extensible flow processing in software-defined networks |
US8521905B2 (en) | 2011-12-22 | 2013-08-27 | Telefonaktiebolaget L M Ericsson (Publ) | System for flexible and extensible flow processing in software-defined networks |
US9690605B2 (en) | 2012-04-09 | 2017-06-27 | Hewlett Packard Enterprise Development Lp | Configuration of an edge switch downlink port with a network policy of a published network configuration service type |
WO2013158920A1 (fr) | 2012-04-18 | 2013-10-24 | Nicira, Inc. | Echange d'informations sur l'état d'un réseau entre des éléments de transfert |
WO2013184941A1 (fr) | 2012-06-06 | 2013-12-12 | Huawei Technologies Co., Ltd. | Procédé d'intégration transparente et d'évolution indépendante d'un réseautage centré sur l'information par l'intermédiaire d'un réseautage défini par logiciel |
US9304801B2 (en) | 2012-06-12 | 2016-04-05 | TELEFONAKTIEBOLAGET L M ERRICSSON (publ) | Elastic enforcement layer for cloud security using SDN |
US9094459B2 (en) | 2012-07-16 | 2015-07-28 | International Business Machines Corporation | Flow based overlay network |
US9104492B2 (en) | 2012-09-04 | 2015-08-11 | Wisconsin Alumni Research Foundation | Cloud-based middlebox management system |
US9467326B2 (en) | 2012-12-03 | 2016-10-11 | Hewlett-Packard Development Company, L.P. | Rate limiting mechanism based on device load/capacity or traffic content |
-
2012
- 2012-11-15 EP EP12849015.8A patent/EP2748716B1/fr active Active
- 2012-11-15 JP JP2014541432A patent/JP5898780B2/ja active Active
- 2012-11-15 EP EP12850519.5A patent/EP2748717B1/fr active Active
- 2012-11-15 EP EP12850665.6A patent/EP2748978B1/fr active Active
- 2012-11-15 US US13/678,522 patent/US10514941B2/en active Active
- 2012-11-15 US US13/678,504 patent/US9015823B2/en active Active
- 2012-11-15 WO PCT/US2012/065364 patent/WO2013074847A1/fr active Application Filing
- 2012-11-15 EP EP21158589.8A patent/EP3846043B1/fr active Active
- 2012-11-15 US US13/678,498 patent/US8966024B2/en active Active
- 2012-11-15 US US13/678,512 patent/US9172603B2/en active Active
- 2012-11-15 CN CN201280055041.XA patent/CN103917967B/zh active Active
- 2012-11-15 EP EP18167170.2A patent/EP3373560B1/fr active Active
- 2012-11-15 US US13/678,518 patent/US8913611B2/en active Active
- 2012-11-15 EP EP12849295.6A patent/EP2748750B1/fr active Active
- 2012-11-15 WO PCT/US2012/065341 patent/WO2013074828A1/fr active Application Filing
- 2012-11-15 AU AU2012340383A patent/AU2012340383B2/en active Active
- 2012-11-15 WO PCT/US2012/065339 patent/WO2013074827A1/fr active Application Filing
- 2012-11-15 AU AU2012340387A patent/AU2012340387B2/en active Active
- 2012-11-15 WO PCT/US2012/065359 patent/WO2013074842A1/fr active Application Filing
- 2012-11-15 US US13/678,520 patent/US9195491B2/en active Active
- 2012-11-15 EP EP12849710.4A patent/EP2748714B1/fr active Active
- 2012-11-15 US US13/678,536 patent/US10089127B2/en active Active
- 2012-11-15 WO PCT/US2012/065361 patent/WO2013074844A1/fr active Application Filing
- 2012-11-15 WO PCT/US2012/065383 patent/WO2013074855A1/fr active Application Filing
- 2012-11-15 CN CN201280055039.2A patent/CN103930882B/zh active Active
- 2012-11-15 JP JP2014541431A patent/JP5714187B2/ja active Active
- 2012-11-15 US US13/678,485 patent/US8966029B2/en active Active
- 2012-11-15 WO PCT/US2012/065345 patent/WO2013074831A1/fr active Application Filing
- 2012-11-15 CN CN201710806041.3A patent/CN107395445B/zh active Active
- 2012-11-15 EP EP12849104.0A patent/EP2748713B1/fr active Active
-
2014
- 2014-11-20 US US14/549,517 patent/US9306909B2/en active Active
- 2014-11-20 US US14/549,512 patent/US9697030B2/en active Active
-
2015
- 2015-01-12 US US14/595,195 patent/US9558027B2/en active Active
- 2015-01-12 US US14/595,199 patent/US9697033B2/en active Active
- 2015-03-09 JP JP2015046304A patent/JP5961718B2/ja active Active
- 2015-04-15 US US14/687,869 patent/US20150222598A1/en active Pending
- 2015-11-16 US US14/942,948 patent/US9552219B2/en active Active
-
2016
- 2016-03-04 JP JP2016042758A patent/JP6125682B2/ja active Active
-
2017
- 2017-01-04 US US15/398,689 patent/US10235199B2/en active Active
- 2017-01-04 US US15/398,709 patent/US10310886B2/en active Active
- 2017-04-05 JP JP2017075430A patent/JP6346690B2/ja active Active
- 2017-06-09 US US15/618,951 patent/US10191763B2/en active Active
-
2018
- 2018-09-30 US US16/147,831 patent/US10977067B2/en active Active
-
2019
- 2019-01-02 US US16/238,446 patent/US10884780B2/en active Active
- 2019-05-03 US US16/403,487 patent/US10922124B2/en active Active
- 2019-11-11 US US16/680,398 patent/US10949248B2/en active Active
-
2021
- 2021-01-04 US US17/140,792 patent/US11372671B2/en active Active
- 2021-02-11 US US17/174,330 patent/US11593148B2/en active Active
- 2021-03-13 US US17/200,784 patent/US20210200572A1/en active Pending
-
2022
- 2022-06-27 US US17/850,925 patent/US11740923B2/en active Active
-
2023
- 2023-02-27 US US18/114,613 patent/US20230205568A1/en active Pending
- 2023-07-07 US US18/219,234 patent/US20230359479A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030093481A1 (en) * | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
US20050060365A1 (en) * | 2002-01-24 | 2005-03-17 | Robinson Scott L. | Context-based information processing |
US20080002579A1 (en) * | 2004-12-21 | 2008-01-03 | Fredrik Lindholm | Arrangement and a Method Relating to Flow of Packets in Communication Systems |
US20080005293A1 (en) * | 2006-06-30 | 2008-01-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Router and method for server load balancing |
US20090129271A1 (en) * | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20090161547A1 (en) * | 2007-12-20 | 2009-06-25 | Packeteer, Inc. | Compression Mechanisms for Control Plane-Data Plane Processing Architectures |
Non-Patent Citations (1)
Title |
---|
L. POPA ET AL.: "Building Extensible Networks with Rule-Based Forwarding", USENIX OSDI, 2010, Retrieved from the Internet <URL:http://static.usenix.org/events/osdil0/tech/fullpapers/Popa.pdf> [retrieved on 20130107] * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8913611B2 (en) | 2011-11-15 | 2014-12-16 | Nicira, Inc. | Connection identifier assignment and source network address translation |
US9015823B2 (en) | 2011-11-15 | 2015-04-21 | Nicira, Inc. | Firewalls in logical networks |
US9552219B2 (en) | 2011-11-15 | 2017-01-24 | Nicira, Inc. | Migrating middlebox state for distributed middleboxes |
US10235199B2 (en) | 2011-11-15 | 2019-03-19 | Nicira, Inc. | Migrating middlebox state for distributed middleboxes |
US10310886B2 (en) | 2011-11-15 | 2019-06-04 | Nicira, Inc. | Network control system for configuring middleboxes |
US10514941B2 (en) | 2011-11-15 | 2019-12-24 | Nicira, Inc. | Load balancing and destination network address translation middleboxes |
US10884780B2 (en) | 2011-11-15 | 2021-01-05 | Nicira, Inc. | Architecture of networks with middleboxes |
US10922124B2 (en) | 2011-11-15 | 2021-02-16 | Nicira, Inc. | Network control system for configuring middleboxes |
US10949248B2 (en) | 2011-11-15 | 2021-03-16 | Nicira, Inc. | Load balancing and destination network address translation middleboxes |
US10977067B2 (en) | 2011-11-15 | 2021-04-13 | Nicira, Inc. | Control plane interface for logical middlebox services |
US11372671B2 (en) | 2011-11-15 | 2022-06-28 | Nicira, Inc. | Architecture of networks with middleboxes |
US11593148B2 (en) | 2011-11-15 | 2023-02-28 | Nicira, Inc. | Network control system for configuring middleboxes |
US11740923B2 (en) | 2011-11-15 | 2023-08-29 | Nicira, Inc. | Architecture of networks with middleboxes |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10977067B2 (en) | Control plane interface for logical middlebox services | |
EP2748977B1 (fr) | Contrôleurs de châssis destinés à convertir des flux universels | |
AU2017204765B2 (en) | Network control system for configuring middleboxes | |
AU2018204247A1 (en) | Architecture of networks with middleboxes | |
AU2017204764B2 (en) | Chassis controllers for converting universal flows |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12850686 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12850686 Country of ref document: EP Kind code of ref document: A1 |